TRENDING ON ONEINDIA
- Four-Storey Building Collapses In Gurugram; Many Feared Trapped
- Virat Kohli To Be Rested For Last Two ODIs And T20I Series Against New Zealand
- New Mahindra Thar Model’s Spy Pics Out Again — Is It The Largest Indian Off-Roader Ever Made?
- PayTM Mall On Republic Day — Samsung Carnival Offers
- Best Low-Priced Stocks To Buy For 2019
- Ajay Devgn Shares His Opinion On #MeToo Movement
- All You Want To Know About Toothukudi
- Deepika Padukone Adds Another All-black Ensemble With This Airport Attire
A study has revealed that the unique login identity that is verified by the network server is user friendly but it has three main flaws namely, the anonymity of communicating users, the identity theft and misplaced trust.
Mohamed Gouda and his colleagues from the University of Texas have worked on a new login based network that is linked with an unlimited list of user selected pseudonyms that bypasses all these issues.
Other the user, the network authority server will know the address of the user and the pool of the pseudonyms that is linked with the address, says the report.
The issue about the anonymous communication using the network is a very old one and it has required a considerable research, claims the statement of the researchers.
In 1981, researchers have tries to address the issue and for these couple of decades, the methods like Onion routing and Tor Protocol were used as the solutions.
However, these approaches has scaling issues that will limit the number of concurrent users without making great investments in the network servers in order to make them carry the requisite data traffic.
In the new network structure, the users will not have identities instead they will have pseudonyms with which they will be contacted and that they can change often.
The authentication is done by the users and not by the central authority certification. This network does not have identity and therefore it does not have any identity theft.
A researcher claims that this will be an all new network that is quite distinct from the reputation based peer-to-peer ones and the traditional client based ones.