Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security

In this paper, we have proved the diminution in error approximation when identity authentication is done with Ideal Password Authentication Scheme (IPAS) for Network Security. Effectiveness of identity authentication parameters for various attacks and security requirements is verified in the paper. Result of analysis proves that IPAS would enhance the transport layer security. Proof of efficiency of result is generated with drastic diminution in error approximation. IPAS would have advanced security parameters with implemented RNA-FINNT which would result in fortification of the transport layer security protocol for enhancement of Network Security.


Introduction
Identity Authentication could be done with Password, Smart Cards and Fingerprints.As the Smart card loss is very common attack on the network so this identity authentication parameter is not completely reliable.Password faces the dictionary attacks, stolen verifier attack, and man in the middle attack etc in common.So it states that there should be an Ideal Password Authentication Scheme which should have an assimilation of most effective identity authentication parameters.Survey on user's choice was done and it concluded that fingerprint would be the most acceptable identity authentication parameter in future along with password [1].So assimilation of password and fingerprint would generate an ideal password authentication scheme [2].
Fingerprint could be extracted on the basis of template, texture and minutiae points.Amongst the three minutiae points, it is the most effective as no one has the same number of points on the same place.Minutiae points give uniqueness to the fingerprint.There are various algorithms for extracting minutiae points like grid hash, angle hash and minimum distance hash.But we derived a new algorithm RNA-FINNT for extracting the minutiae point's values of the fingerprint [3].This paper has validation of diminution in error approximation in terms of percentage.IPAS which is generated with assimilation of password and fingerprint is used to validate the results.RNA-FINNT is used to extract values of minutiae points [3].Calculations with respect to various fingerprint extraction algorithms are done by assimilating them with Password.Comparative analysis of all these calculations validates that the percentage of error would reduce when password is assimilated with fingerprint in which extraction of minutiae points is performed by RNA-FINNT.
Remainder sections of the paper prove this validation.Section 2 proposes methodology for proving the diminution in error approximation, Section 3 states the effectiveness of Identity Authentication Parameters for various Attacks and Security Requirements, Section 4 generates a proof of Diminution in Error Approximation and Section 5 suggests the advanced security parameters of ideal password authentication scheme which results in fortification of transport layer security protocol for enhancement of network security.

Proposed Methodology for Proving the Diminution in Error Approximation
To prove diminution in error approximation we have used a comparative study in which assimilation of existing fingerprint extraction algorithms is dome with password.Our new algorithm RNA-FINNT is also assimilated with password which generates an ideal password authentication scheme.Multi server environment is required for implementation of IPAS [4].Methodology proves that IPAS results in diminution in error approximation.Flowchart defines the proposed methodology (Figure 1).

Mentioned below Is the Stepwise Process for Proving Diminution in Error Approximation
Step 1: Calculate the total number of Attacks and Security Requirements possible on each Identity Authentication Parameter.This implies for password, fingerprint (extraction with Grid Hash Algorithm) [5], fingerprint (extraction with Angle Hash Algorithm) [5], fingerprint (extraction with Minimum Distance Hash Algorithm) [5] and fingerprint (extraction with RNA-FINNT Hash Algorithm) [3].
Step 2: Calculate the total number of Attacks and Security Requirements possible if password is assimilated with on each Identity Authentication Parameter.This implies for password assimilation with fingerprint (extraction with Grid Hash Algorithm), fingerprint (extraction with Angle Hash Algorithm), fingerprint (extraction with Minimum Distance Hash Algorithm) and fingerprint (extraction with RNA-FINNT Hash Algorithm) respectively.
Step 3: Proof would be derived from the result of Step 2 that less number of attacks are possible if password is assimilated with fingerprint (extraction with RNA-FIN- NT Hash Algorithm) which is an Ideal Password Authentication Scheme.
Step 4: Calculate the total error percentage if password is assimilated with on each Identity Authentication Parameter.This implies for password assimilation with fingerprint (extraction with Grid Hash Algorithm), fingerprint (extraction with Angle Hash Algorithm), fingerprint (extraction with Minimum Distance Hash Algorithm) and fingerprint (extraction with RNA-FINNT Hash Algorithm) respectively.
Step 5: Proof would be derived from the result of Step 4 that less number of error would be there if password is assimilated with fingerprint (extraction with RNA-FIN-NT Hash Algorithm) which is an Ideal Password Authentication Scheme. Error Total Number of Attacks and Security Requirements possible if: Total Error Percentage when p is assimilated with f (g) = te (pg) Total Error Percentage when p is assimilated with f (a) = te (pa) Total Error Percentage when p is assimilated with f (m) = te (pm) Total Error Percentage when p is assimilated with f (r) = te (pr) Total Number of defined Attacks and Security Requirements are n but if:

Proposed Methodology for Validating Results
Step 1: Calculate the total number of Attacks and Security requirements possible on each Identity Authentication Parameter.
Step 2: Calculate the total number of Attacks and Security requirements possible if p is assimilated with each Identity Authentication Parameter.
Step 3: Proof is derived from Step 2 that less number of attacks are possible if p is assimilated with f (r) i.e. an Ideal Password Authentication Scheme.
Proof: p (f (r)) is best for Identity Authentication.
Step 4: Calculate the Total Error Percentage if p is assimilated with each Identity Authentication Parameter.
te pr p e f r e n p f r    Step 5: Proof is derived from Step 4 that less number of error would be there if assimilation of p with f(r) is implemented i.e.Ideal Password Authentication Scheme.
When the above mentioned steps are executed in the sequential order then the resulted output shows the error diminution.This process is implemented through the framework specifically designed to prove the result [6].Through the framework fingerprint extraction is done through RNA-FINNT and is assimilated with the Password.This assimilation is IPAS which is an Ideal Password Authentication Scheme and results in the diminution of error percentage while matching the fingerprint.Section 4 validates the result with exact data for proving the diminution in the error approximation.

Proof of Diminution in Error Approximation
While validating the diminution in error approximation, RNA-FINNT is implemented in IPAS [24].In RNA-FINNT number of minutiae points extracted is more than 12 so the overall reduction of error while extracting fingerprint is 4 [25].On the basis of result of Section 3 (number of attacks) the steps of Section 2 are followed and below mentioned is the validation of the result.Below mentioned steps proved that as only 8 attacks are possible on RNA-FINNT so it result in diminution of error approximation.

Proposed Methodology for Validating Results
Step  Step 5: Proof is derived from Step 4 that only 33% of error would be there if assimilation of p with f(r) is implemented i.e.Ideal Password Authentication Scheme.
When password is assimilated with fingerprint (extraction with Grid Hash Algorithm) or fingerprints (extraction with Angle Hash Algorithm) or fingerprints (extraction with Minimum Distance Hash Algorithm) or fingerprint (extraction with RNA-FINNT Hash Algorithm) the error approximation is 72, 67, 73 and 33 respectively.Result derived is that in IPAS number of minutiae points extracted are more than12 so the error percentage drastically gets reduced to 4 [25] and IPAS error approximation on the basis of attacks and security requirements over the transport layer is just 33.

Advanced Security Parameters of IPAS Results in FTLSP for Enhancement of Network Security
When only limited attacks or security requirements could be practiced by intruders over the network then data would remain more secure.These attacks hinder the data communication on the transport layer.RNA-FINNT resulted to generate an ideal password authentication scheme which has password assimilated with fingerprint.Extraction process with the help of RNA-FINNT has improved and this would enhance the security at the network layer.With IPAS intruder cannot impersonate a legal user by stealing the user's ID and PW from the password table whenever user accesses data from remote server because storage at the server is done with hash code values.Along with this mutual authentication is implemented in the multi server environment so that IP or Server Spoofing could be eliminated.The organization which would be using this IPAS should have Secured Socket Layer implemented in the Virtual Private Network because it enhances the security of a message transmission on the internet.

Conclusion
Conclusion is that implementation of ideal password authentication scheme results in the diminution of error approximation, fortifies the transport layer (Secured Socket Layer implemented in the Virtual Private Network of an organization) and enhances the network security.

Table 1 . Comparative study of attacks and security require- ments on identity authentication parameters.
S. No Security Requirements and Attacksp f (g) f (a) f (m) f (r) 8 Out of total 18, number of attacks possible on password is 16, fingerprint (extraction with Grid Hash Algorithm) is 15, fingerprint (extraction with Angle Hash Algorithm) is 14, fingerprint (extraction with Minimum Distance Hash Algorithm) is 15 and fingerprint (extraction with RNA-FINNT (Reduced Number of Angles Fingerprint) Hash Algorithm) is 8.This implies that only 8 attacks or security requirements are possible on IPAS (Ideal Password Authentication Scheme).
Calculate the total number of Attacks and Se-curity requirements possible if p is assimilated with each Identity Authentication Parameter.
Proof is derived from Step 2 that only 6 numbers of attacks are possible if p is assimilated with f (r) i.e. an Ideal Password Authentication Scheme.Calculate the Total Error Percentage if p is assimilated with each Identity Authentication Parameter.