Skip to main content

Intrusion Prevention by Native Language Password Authentication Scheme

  • Conference paper
Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

Abstract

In a multi-user system, user name and password serves to authenticate the user. Generally users select alphanumerical passwords or textual passwords in English. It is easy for the intruder to crack these passwords by eaves dropping, password stealing, dictionary attack and shoulder surfing. To overcome these vulnerabilities, graphical password schemes have been introduced. An intruder can easily break the simple graphical password authentication schemes by shoulder surfing and hidden cameras. In this paper a new shape based textual authentication scheme for native language passwords is proposed. User selects a character from his native language and the shape of this character becomes password criteria. The proposed authentication scheme is resistant to attacks like password stealing, eves dropping, shoulder surfing and hidden cameras because every time user enters a new password.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blonder, G.E.: Graphical Passwords, in Lucent Technologies, Inc., Murray Hill, NJ, U. S. Patent, Ed.United States (1996)

    Google Scholar 

  2. Dhamija, R., Perrig, A.: Deja Vu: A User Study using Images For Authentication. In: 9th USENIX Security Symposium (2000)

    Google Scholar 

  3. Goldberg, J., Hagman, J., Sazawal, V.: Doodling Our Way To Better Authentication. In: CHI 2002 extended abstracts on Human Factors in Computer Systems (2002)

    Google Scholar 

  4. Jansen, W.: Authenticating Mobile Device User through Image Selection. Data Security (2004)

    Google Scholar 

  5. Jansen, W.: Authenticating Users on Handheld Devices. In: Proceedings of Canadian Information Technology Security Symposium (2003)

    Google Scholar 

  6. Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin: The design and analysis of graphical passwords. In: Proceedings of USENIX Security Symposium (August 1999)

    Google Scholar 

  7. Luca, A.D., Weiss, R., Hussmann, H.: PassShape:stroke based shape passwords. In: Proceedings of the conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artifacts and environments, Adelaide, Australia, November 28-30, pp. 239–240 (2007)

    Google Scholar 

  8. Man, S., Hong, D., Mathews, M.: A shouldersurfing resistant graphical password scheme. In: Proceedings of International conference on security and management, LasVergas, NV (2003)

    Google Scholar 

  9. Suo, X., Zhu, Y., Owen, G.S.: Graphical passwords: A survey. In: 21st Annual Computer Security Applications Conference (ASCSAC 2005), Tucson (2005)

    Google Scholar 

  10. Weinshall, D., Kirkpatrick, S.: Passwords You’ll Never Forget, but Can’t Recall. In: Proceedings of Conference on Hman Factors in Computing Systems (CHI). ACM, Vienna (2004)

    Google Scholar 

  11. Stallings, W.: Cryptography and Network Security, 4th edn. Pearson Education Inc., London

    Google Scholar 

  12. Zhao, H., Li, X.: S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), Canada, vol. 2, pp. 467–472 (2007)

    Google Scholar 

  13. Zheng, Z., Liu, X., Yin, L., Liu, Z.: A Hybrid password authentication scheme based on shape and text. Journal of Computers 5(5) (May 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Malempati, S., Mogalla, S. (2011). Intrusion Prevention by Native Language Password Authentication Scheme. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics