Abstract
With the evolving trends in technology, providing security for the users is an essential goal of the application. Authentication is one such important aspect of security which provides access control for the users of an application. The common method to provide authentication is by using a username/password pair .Graphical password authentication has proved to be more powerful and useful when compared to traditional textual password authentication. In this paper we propose a novel graphical password based authentication system called GAS(Grid based Authentication System). We focus our attention on the epigram, “It is easy to remember what we see rather than what we hear”. The methodology involves choosing a pattern called Auth Pattern which is formed by placing images in a given grid. We have chosen an optimal size for the grid as 8*8.Our proposed system considers very important parameters such as user memory and length of the password. Considering these parameters we compare our system with the state of the art authentication systems to prove our methodology’s efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chiasson, S., Stobert, E., Forget, A., Biddle, R., van Oorschot, P.C.: Persuasive Cued Click-Points: Design,Implementation, and Evaluation of Knowledge-Based Authentication Mechanism. IEEE Transactions on Dependable and Secure Computing 9(2) (March-April 2012)
Dass, S.C., Zhu, Y., Jain, A.K.: Validating a Biometric Authentication System: Sample Size Requirements. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12) (December 2006)
Almuairfi, S.: IPAS: Implicit Password Authentication System. In: 2011 Workshops of International Conference on Advanced Information Networking and Applications
Salehi-Abari, A., Thorpe, J., van Oorschot, P.C.: On Purely Automated Attacks and Click-Based Graphical Passwords. In: 2008 Annual Computer Security Applications Conference
Tao, H.: Pass-Go, a New Graphical Password Scheme
Man, S., Hong, D., Matthews, M.: A Shoulder-Surfing Resistant Graphical Password Scheme WIW
Martinez-Diaz, M., Martin-Diaz, C., Galbally, J., Fierrez, J.: A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods. In: 2010 12th International Conference on Frontiers in Handwriting Recognition (2010)
Ma, Y., Feng, J.: Evaluating Usability of Three Authentication Methods in Web-Based Application. In: 2011 Ninth International Conference on Software Engineering Research, Management and Applications
Bicaki, K.: Towards Usable Solutions to Graphical Password Hotspot Problem. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference
Malempati, S., Mogalla, S.: A Well Known Tool Based Graphical Authentication Technique. In: CCSEA 2011, pp. 97–104 (2011)
Doja, M.N., Kumar, N.: Image Authentication Schemesagainst Key-Logger Spyware. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
Hu, W., Wu, X., Wei, G.: The Security Analysis of Graphical Passwords. In: 2010 International Conference on Communications and Intelligence Information Security
Zhao, H., Li, X.: S3PAS:A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007 (2007)
Gao, H., Ren, Z., Chang, X., Liu, X.: A New Graphical Password Scheme Resistant to Shoulder-Surfing. In: 2010 International Conference on Cyberworlds
Zhao, S., Aggarwal, A., Kent, R.D.: PKI-Based Authentication Mechanisms in Grid Systems. In: International Conference on Networking, Architecture, and Storage, NAS 2007 (2007)
Tappenden, A., Miller, J.: A Three-Tiered Testing Strategy for Cookies. In: 2008 International Conference on Software Testing, Verification, and Validation
Juels, A., Jakobsson, M., Jakobsson, M.: Cache Cookies for Browser Authentication. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, S and P 2006 (2006)
Jrvinen, K., Tommiska, M., Skytt, J.: Hardware Implementation Analysis of the MD5 Hash Algorithm. In: Proceedings of the 38th Hawaii International Conference on System Sciences (2005)
Chen, Z., Guo, S., Duan, R., Wang, S.: Security Analysis on Mutual Authentication against Man-in-the-Middle Attack. In: The 1st International Conference on Information Science and Engineering, ICISE 2009 (2009)
Alicherry, M., Keromytis, A.D.: DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks. IEEE (2009)
Rahman, K.A., Balagani, K.S., Phoha, V.V.: Making Impostor Pass Rates Meaningless: A Case of Snoop-Forge-Replay Attack on Continuous Cyber-behavioral Verification with Keystrokes. IEEE (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gowraj, N., Avireddy, S., Prabhu, S. (2013). GAS: A Novel Grid Based Authentication System. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_51
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)