Skip to main content

Generation of Array Passwords Using Petri Net for Effective Network and Information Security

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 308))

Abstract

Over the years, information and network security in the field of computer is an everlasting troublesome area under discussion. Information and network security instigates with the user. The important feature of security is ‘Password Authentication.’ A human-created password comes from a small domain. It is just a matter of time for hackers to break security measures with the available computer power and tools. Online services can be accessible by using distinct passwords with varying strengths. Cracking or decoding the password has created serious challenges or threats in providing security of the information. Highly secured password generation therefore has become a challenging task. In this work, Petri net-based array password generation has been done. The methodology adapted in this paper is novel and more immune.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gehringer, E.F.: Choosing passwords: security and Human factors. In: IEEE 2002 International Symposium on Technology and Society (ISTAS’02), pp. 369–373, ISBN: 0-7803-7284-0 (2002)

    Google Scholar 

  2. Morris, R., Thompson, K.: Bell Laboratories “Password Security: A case History” Communication of ACM, vol. 22, pp. 594–597, Nov 1979

    Google Scholar 

  3. Hong, J.: Passwords getting painful, computing still blissful. Commun. ACM 56(3), March 2013

    Google Scholar 

  4. Vaithyasubramanian, S., Christy, A.: A Practice to Create user friendly secured password using CFG. In: Accepted for International Conference on Mathematical and Engineering Sciences—2014 (ICMES 2014)

    Google Scholar 

  5. Vaithyasubramanian, S., Christy, A.: A scheme to create secured random password using markov chain. In: Accepted for International Conference on Artificial intelligence and Evolutionary Algorithms in Engineering Systems—2014 (ICAEES 2014)

    Google Scholar 

  6. Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 625–632 (2008)

    Google Scholar 

  7. Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), July 2013

    Google Scholar 

  8. Adebola, O., Ithnin, N., Jali, M.Z., Akosu, N.: Graphical password Schemes design: enhancing memorability features using Autobiographical Memories. J. Theor. Appl. Inf. Technol. 53(1), 10 July 2013

    Google Scholar 

  9. Sonkar, S.K., Paikrao, R.L., Kumar, A.: Graphical password authentication scheme based on color image gallery. Int. J. Eng. Innovative Technol. (IJEIT) 2(4), October 2012

    Google Scholar 

  10. Yan, J.J., Blackwell, A.F., Anderson, R.J., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)

    Google Scholar 

  11. Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on the World Wide Web, Acm Digital Library, pp. 657–666 (2007)

    Google Scholar 

  12. AlFayyadh, B., Thorsheim, P., Jøsang, A., Klevjer, H (2012) Improving usability of password management with standardized password policies. In: The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 Cabourg, ISBN: 978-2-9542630-0-7, May 2012

    Google Scholar 

  13. http://resources.infosecinstitute.com/dictionary-attack-using-burp-suite

  14. Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: basic results. In: Human-Computer Interaction International (HCII) (2005)

    Google Scholar 

  15. Sarohi, H. K., Khan, F. U.:Graphical password authentication schemes: current status and key issues. Int. J. Eng. Innovative Technol. (IJEIT) 10(2), No 1, March 2013

    Google Scholar 

  16. Ahmad, S.M.S., et al.: technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innovative Comput. Inf. Control 8 (11), 7983–7999, ISSN 1349-4198, November 2012

    Google Scholar 

  17. Bhatnagar, M., Jain, R.K., Khairnar, N.S.,: A survey on behavioral biometric techniques: mouse vs. keyboard dynamics. In: IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology, pp. 27–30 (2013)

    Google Scholar 

  18. Peterson, J.L.: Petri Net Theory and Modeling of systems. Prentice Hall Inc., Englewood Cliffs (1981)

    Google Scholar 

  19. Lalitha, D., Rangarajan, K.: Column and row catenation petri net systems. In: Proceeding of 5th IEEE International Conference on Bio-Inspired Computing: Theories and Applications, pp. 1382–1387 (2010)

    Google Scholar 

  20. Lalitha, D., Rangarajan, K., Thomas, D.G.: Rectangular Arrays and Petri Nets, Combinatorial Image Analysis, vol. 7655, pp. 166–180. LNCS, London (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Vaithyasubramanian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Vaithyasubramanian, S., Christy, A., Lalitha, D. (2015). Generation of Array Passwords Using Petri Net for Effective Network and Information Security. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2012-1_20

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2011-4

  • Online ISBN: 978-81-322-2012-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics