Open Access Open Access  Restricted Access Subscription or Fee Access

Implicit Password Authentication System

A. Pandian, J. Venkatasubramanian, K. Balaji

Abstract


Authentication is the first line of defense against
compromising confidentiality and integrity. Though traditional
login/password based schemes are easy to implement, they have been subjected to several attacks. As alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit
Password Authentication System, which is immune to the common attacks suffered by other authentication schemes. IPAS is similar to the Pass Point scheme with some finer differences. In every “what youknow type” authentication scheme we are aware of, the server requests
the user to reproduce the fact given to the server at the time of registration. This is also true in graphical passwords such as Pass Point.


Keywords


Security System, Authentication Scheme, IPAS.

Full Text:

PDF

References


Sabzevar, A.P. & Stavrou, A., 2008,” Universal Multi-Factor

Authentication Using Graphical Passwords”, IEEE International

Conference on Signal Image Technology and Internet Based Systems

(SITIS).

Haichang, G., L. Xiyang, et al. (2009). “Design and Analysis of a[3] Graphical Password Scheme”, Innovative Computing, Information and

Control (ICICIC), 2009 Fourth International Conference on Graphical

Passwords.

Pierce JD, Jason G. Wells, Matthew J. Warren, & David R.

Mackay(2003). “A Conceptual Model for Graphical Authentication”, 1st

Australian Information security Management Conference, 24 Sept. Perth,

Western Australia, paper 16. Xiaoyuan, S., Z. Ying, et al. (2005).

“Graphical passwords: a survey”,

Computer Security Applications Conference, 21st Annual.

Wells, Jason; Hutchinson, Damien; and Pierce, Justin, "Enhanced

Security for Preventing Man-in-the-Middle Attacks in Authentication,

formation Security Management Conference. Paper 58.

Takada, T. and H. Koike (2003). “Awase-E: Image-Based Authentication

for Mobile Phones Using User’s Favorite Images”,

Human-Computer Interaction with Mobile Devices and Services,

Springer Berlin / Heidelberg. 2795: 347-351.

Dirik, A. E., N. Memon, et al. (2007). “Modeling user choice in the

PassPoints graphical password scheme”, Proceedings of the 3rd

symposium on Usable privacy and security. Pittsburgh,

Pennsylvania,ACM.

Wei-Chi, K. and T. Maw-Jinn (2005). “A Remote User

Authentication Scheme Using Strong Graphical Passwords”, Local

Computer Networks, 2005. 30th Anniversary. Lashkari, A. H., F.

Towhidi, et al. (2009). “A Complete Comparison

on Pure and Cued Recall-Based Graphical User Authentication

Algorithms”, Computer and Electrical Engineering, 2009. ICCEE

'09.Second International Conference.

Renaud, K. (2009)."On user involvement in production of images used in

visual authentication." J. Vis. Lang. Comput. 20(1): 1-15.

Masrom, M., F. Towhidi, et al. (2009). “Pure and cued recall-based

graphical user authentication”, Application of Information and

Communication Technologies, 2009. AICT 2009. International

Conference.

Birget, J. C., H. Dawei, et al. (2006). "Graphical passwords based on

robust discretization", Information Forensics and Security, IEEE

Transactions on 1(3): 395-399.

S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N.

Memon,``PassPoints: Design and longitudinal evaluation of a graphical

password system'', International J. of Human-Computer Studies (Special

Issue on HCI Research in Privacy and Security), 63 (2005)102-127.

S. Wiedenbeck, J. Waters, J.C. Birget, A. Brodskiy, N.Memon,

``Authentication using graphical passwords: Effects of tolerance and

image choice'', Symposium on Usable Privacy and Security (SOUPS), 6-8

July 2005, at Carnegie-Mellon Univ.,Pittsburgh.

A Python Package for Learning Gaussian Mixture Models

J. Bigun, J. Fierrez-Aguilar, J. Ortega-Garcia, and J.

Gonzalez-Rodriguez. Combining biometricevidence for person

authentication. In Advanced Studies in Biometrics, 2005.

R. Brunelli and D. Falavigna. Person identification using multiple cues. In

IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995.

K. Chang, J. Hightower, and B. Kveton. Inferring identity using

accelerometers in television remote controls. In International Conference

on Pervasive Computing, 2009.

M. L. Damiani and C. Silvestri. Towards movement-aware access

control. In SIGSPATIALACM GIS 2008 International Workshop on

Security and Privacy in GIS and LBS, 2008.

D. Dwork. Differential privacy: A survey of results. In TAMC, 2008.

H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and

D. Estrin. Diversity in smartphone usage. In MobiSys, 2010.

S. Furnell, N. Clarke, and S. Karatzouni. Beyond the pin: Enhancing user

authentication for mobile devices. Computer Fraud and Security, 2008.

D. Gafurov, K. Helkala, and T. Søndrol. Biometric gait authentication

using accelerometer sensor. JCP, 1(7):51–59, 2006.

R. Greenstadt and J. Beal. Cognitive security for personal devices. In

AISec, 2008.

M. Jakobsson and A. Juels. Server-side detection of malware infection. In

NSPW, 2009.

M. Jakobsson, E. Shi, P. Golle, and R. Chow. Implicit Authentication for

Mobile Devices. In HotSec, 2009.

A. Kale, N. Cuntoor, and V. Kr¨uger. Gait-Based Recognition of Humans

Using Continuous HMMs. In FGR, 2002.

G. Leggett, J. Williams, and M. Usnick. Dynamic identity verification

via keystroke characteristics.In International Journal of Man-Machine

Studies, 1998.

F. Monrose and A. Rubin. Authentication via keystroke dynamics. In

CCS, 1997.

A. Moore. Lecture Notes: Gaussian Mixture Models.

http://www.cs.cmu.edu/afs/cs/Web/People/awm/tutorials/gmm.html.

M. Nisenson, I. Yariv, R. El-Yaniv, and R. Meir. Towards behaviometric

security systems: Learning to identify a typist. In PKDD, 2003.

L. Rainie and J. Anderson. The Future of the Internet III.

http://www.pewinternet.org/Reports/2008/The-Future-of-the-Internet-III

.aspx.

N. Sastry, U. Shankar, and D. Wagner. Secure verification of location

claims. In WiSe ’03:Proceedings of the 2nd ACM workshop on Wireless

security, 2003.

S. Schroeder. Smartphones Are Selling Like Crazy.

http://mashable.com/2010/02/05/smartphones-sales/.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.