Abstract
Secure authentication scheme is required to protect businesses and clients against attacks. Passwords are used as private identity for an individual. The password has to be protected from several threats like stealing, shoulder surfing, eavesdropping and guessing. Several work has been done to improve the traditional password based authentication such as biometric password authentication, graphical password scheme, and dynamic password scheme etc. Graphical passwords are strong resistance towards brute force and dictionary attacks. But it suffers to eavesdropping and guessing attacks. However, these schemes have been proved ineffective. In this paper, we have designed a hybrid system by combing the features of three different schemes such as textual password, recognition based password and recall based password. The result shows that proposed model overcomes eavesdropping and guessing more effectively than its counterparts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Evans Jr., A., Kantrowitz, W., Weiss, E.: A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17, 437–442 (1974)
Purdy, G.B.: A high security log-in procedure. Commun. ACM 17, 442–445 (1974)
Kwon, K., Ahn, S.-J., Chung, J.-W.: Network Security Management Using ARP Spoofing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 142–149. Springer, Heidelberg (2004)
Haller, N.M.: The S/Key one-time password system. In: Proc. Internet Society Symposium on Network and Distrbuted System Security, pp. 151–158 (1994)
Mitchell, C.J., Chen, L.: Comments on the S/KEY user authentication scheme. ACM Operating Syst. Rev. 30, 1216 (1996)
Almuairfi, S., Veeraraghavan, P., Chilamkurti, N.: A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices. Mathematical and Computer Modelling 58(12), 108–116 (2013)
Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passp oints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies 63(12), 102–127 (2005)
Shahid, M., Qadeer, M.A.: Novel scheme for securing passwords. In: 3rd IEEE International Conference on Digital Ecosystems and Technologies, DEST 2009, pp. 223–227 (2009)
Almulhem, A.: A graphical password authentication system. In: 2011 World Congress on Internet Security (WorldCIS), pp. 223–225 (2011)
Zheng, Z., Liu, X., Yin, L., Liu, Z.C.: A stroke-based textual password authentication scheme. In: Proceedings of the 2009 First International Workshop on Education Technology and Computer Science, ETCS 2009, vol. 3, pp. 90–95. IEEE Computer Society, Washington, DC (2009)
Liu, X.-Y., Gao, H.-C., Wang, L.-M., Chang, X.-L.: An Enhanced Drawing Reproduction Graphical Password Strategy. J. Comput. Sci. Technol. 26(6), 988–999 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Sahu, S.K., Dalai, A.K., Jena, S.K. (2014). Varying Password Based Scheme for User Authentication. In: Kumar Kundu, M., Mohapatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics- Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-07350-7_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-07350-7_40
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07349-1
Online ISBN: 978-3-319-07350-7
eBook Packages: EngineeringEngineering (R0)