Abstract
As this century marked the beginning of new era in the world of Internet, the need for user authentication system becomes a basic requirement to ensure secure communication with confidentiality and integrity. With the development of authentication systems, the techniques for intruding are also developed by hackers in parallel. So, in order to prevent or at least minimize the attacks, many encryption techniques and authentication schemes also came into existence. This paper also describes one such novel scheme using text-based authentication. Firstly, the present scenario in the context of authentication system and different methods of hacking and breaking into the system are demarcated. Then proposed scheme is mentioned along with the discussion of various features and security issues exposed by this scheme. This scheme will be a time-saving and efficient alternative on measures of user-friendliness and convenience to current authentication system. It can be used in bank ATMs, and other public and private organizations. The aim is to provide fast and efficient method at user convenience so that it can be deployed in various activities relating to common users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kurose, J.F., Ross, K.W.: Computer Networking—A top down Approach. 6th Edn. (2013)
Kushwaha, B.K.: An approach for user authentication one time password (numeric and graphical) scheme. J. Global Res. Comput. Sci. 3(11) (2012)
Saeed, S., Umar, M.S.: A hybrid graphical user authentication scheme. In: Proceedings of Communication, Control and Intelligent Systems (CCIS). IEEE Nov 7–8, 2015
Van Oorschot, P.C., Wan, T.: Two step: an authentication method combining text and graphical passwords. School of Computer Science, Carleton University, Ottawa, Canada
http://searchsecurity.techtarget.com/definition/brute-force-cracking (2017). Last accessed 9 Oct 2017
Zhao, H., Li, X.: S3PAS: A Scalable Shoulder- Surfing Resistant Textual-Graphical Password Authentication Scheme. Scalable Software Systems Laboratory, Department of Computer Science, Oklahoma State University, USA (2007)
Umar, M.S., Khan, I.A., Maqsood, T., Ali, J.: A novel two stage graphical password scheme. In: IEEE-Sponsored National Conference on Emerging Trends in Electronics and Communication Engineering, Sept 14–15, 2006, Goa, India (2006)
Umar, M.S., Rafiq, M.Q., Ansari, J.A.: Graphical user authentication: a time interval based approach. In: Proceedings of 2012 IEEE International Conference on Signal Processing, Computing and Control (2012 IEEE ISPCC) Jaypee University of Information Technology, March 15–17, 2012, Solan, HP, pp. 204–210 (2012)
Rajavat, R., Gala, B., Redekar, A.: Textual and graphical password authentication scheme resistant to shoulder surfing. Int. J. Comput. Appl. 114(15) (2015)
Styaq, S., Agrawal, L.: A new technique for user authentication using numeric one time password scheme. Int. J. Comput. Sci. Eng. 4(5) (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zaheer, Z., Khan, A., Sarosh Umar, M., Khan, M.H. (2019). One-Tip Secure: Next-Gen of Text-Based Password. In: Fong, S., Akashe, S., Mahalle, P. (eds) Information and Communication Technology for Competitive Strategies. Lecture Notes in Networks and Systems, vol 40. Springer, Singapore. https://doi.org/10.1007/978-981-13-0586-3_24
Download citation
DOI: https://doi.org/10.1007/978-981-13-0586-3_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0585-6
Online ISBN: 978-981-13-0586-3
eBook Packages: EngineeringEngineering (R0)