Skip to main content

Varying Password Based Scheme for User Authentication

  • Conference paper
Advanced Computing, Networking and Informatics- Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 28))

Abstract

Secure authentication scheme is required to protect businesses and clients against attacks. Passwords are used as private identity for an individual. The password has to be protected from several threats like stealing, shoulder surfing, eavesdropping and guessing. Several work has been done to improve the traditional password based authentication such as biometric password authentication, graphical password scheme, and dynamic password scheme etc. Graphical passwords are strong resistance towards brute force and dictionary attacks. But it suffers to eavesdropping and guessing attacks. However, these schemes have been proved ineffective. In this paper, we have designed a hybrid system by combing the features of three different schemes such as textual password, recognition based password and recall based password. The result shows that proposed model overcomes eavesdropping and guessing more effectively than its counterparts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Evans Jr., A., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17, 437–442 (1974)

    Article  Google Scholar 

  2. Purdy, G.B.: A high security log-in procedure. Commun. ACM 17, 442–445 (1974)

    Article  MathSciNet  Google Scholar 

  3. Kwon, K., Ahn, S.-J., Chung, J.-W.: Network Security Management Using ARP Spoofing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 142–149. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Haller, N.M.: The S/Key one-time password system. In: Proc. Internet Society Symposium on Network and Distrbuted System Security, pp. 151–158 (1994)

    Google Scholar 

  5. Mitchell, C.J., Chen, L.: Comments on the S/KEY user authentication scheme. ACM Operating Syst. Rev. 30, 1216 (1996)

    Article  Google Scholar 

  6. Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58(12), 108–116 (2013)

    Article  Google Scholar 

  7. Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passp oints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63(12), 102–127 (2005)

    Article  Google Scholar 

  8. Shahid, M., Qadeer, M.A.: Novel scheme for securing passwords. In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, DEST 2009, pp. 223–227 (2009)

    Google Scholar 

  9. Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security (WorldCIS), pp. 223–225 (2011)

    Google Scholar 

  10. Zheng, Z., Liu, X., Yin, L., Liu, Z.C.: A stroke-based textual password authentication scheme. In: Proceedings of the 2009 First International Workshop on Education Technology and Computer Science, ETCS 2009, vol. 3, pp. 90–95. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  11. Liu, X.-Y., Gao, H.-C., Wang, L.-M., Chang, X.-L.: An Enhanced Drawing Reproduction Graphical Password Strategy. J. Comput. Sci. Technol. 26(6), 988–999 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh Kumar Sahu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Sahu, S.K., Dalai, A.K., Jena, S.K. (2014). Varying Password Based Scheme for User Authentication. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07350-7_40

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07349-1

  • Online ISBN: 978-3-319-07350-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics