The authentication is the procedure used by the user to confirm her identity and ensure
that she is the one who is claiming to be. It's obvious that authentication is a compulsory
security concept and a must for trust establishment and Network protection against
unauthorized access or identity impersonation. Different methods can be used to achieve
authentication purpose and are described in the following sections.