Skip to main content

Abstract

With the evolving trends in technology, providing security for the users is an essential goal of the application. Authentication is one such important aspect of security which provides access control for the users of an application. The common method to provide authentication is by using a username/password pair .Graphical password authentication has proved to be more powerful and useful when compared to traditional textual password authentication. In this paper we propose a novel graphical password based authentication system called GAS(Grid based Authentication System). We focus our attention on the epigram, “It is easy to remember what we see rather than what we hear”. The methodology involves choosing a pattern called Auth Pattern which is formed by placing images in a given grid. We have chosen an optimal size for the grid as 8*8.Our proposed system considers very important parameters such as user memory and length of the password. Considering these parameters we compare our system with the state of the art authentication systems to prove our methodology’s efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chiasson, S., Stobert, E., Forget, A., Biddle, R., van Oorschot, P.C.: Persuasive Cued Click-Points: Design,Implementation, and Evaluation of Knowledge-Based Authentication Mechanism. IEEE Transactions on Dependable and Secure Computing 9(2) (March-April 2012)

    Google Scholar 

  2. Dass, S.C., Zhu, Y., Jain, A.K.: Validating a Biometric Authentication System: Sample Size Requirements. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12) (December 2006)

    Google Scholar 

  3. Almuairfi, S.: IPAS: Implicit Password Authentication System. In: 2011 Workshops of International Conference on Advanced Information Networking and Applications

    Google Scholar 

  4. Salehi-Abari, A., Thorpe, J., van Oorschot, P.C.: On Purely Automated Attacks and Click-Based Graphical Passwords. In: 2008 Annual Computer Security Applications Conference

    Google Scholar 

  5. Tao, H.: Pass-Go, a New Graphical Password Scheme

    Google Scholar 

  6. Man, S., Hong, D., Matthews, M.: A Shoulder-Surfing Resistant Graphical Password Scheme WIW

    Google Scholar 

  7. Martinez-Diaz, M., Martin-Diaz, C., Galbally, J., Fierrez, J.: A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods. In: 2010 12th International Conference on Frontiers in Handwriting Recognition (2010)

    Google Scholar 

  8. Ma, Y., Feng, J.: Evaluating Usability of Three Authentication Methods in Web-Based Application. In: 2011 Ninth International Conference on Software Engineering Research, Management and Applications

    Google Scholar 

  9. Bicaki, K.: Towards Usable Solutions to Graphical Password Hotspot Problem. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference

    Google Scholar 

  10. Malempati, S., Mogalla, S.: A Well Known Tool Based Graphical Authentication Technique. In: CCSEA 2011, pp. 97–104 (2011)

    Google Scholar 

  11. Doja, M.N., Kumar, N.: Image Authentication Schemesagainst Key-Logger Spyware. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing

    Google Scholar 

  12. Hu, W., Wu, X., Wei, G.: The Security Analysis of Graphical Passwords. In: 2010 International Conference on Communications and Intelligence Information Security

    Google Scholar 

  13. Zhao, H., Li, X.: S3PAS:A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007 (2007)

    Google Scholar 

  14. Gao, H., Ren, Z., Chang, X., Liu, X.: A New Graphical Password Scheme Resistant to Shoulder-Surfing. In: 2010 International Conference on Cyberworlds

    Google Scholar 

  15. Zhao, S., Aggarwal, A., Kent, R.D.: PKI-Based Authentication Mechanisms in Grid Systems. In: International Conference on Networking, Architecture, and Storage, NAS 2007 (2007)

    Google Scholar 

  16. Tappenden, A., Miller, J.: A Three-Tiered Testing Strategy for Cookies. In: 2008 International Conference on Software Testing, Verification, and Validation

    Google Scholar 

  17. Juels, A., Jakobsson, M., Jakobsson, M.: Cache Cookies for Browser Authentication. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, S and P 2006 (2006)

    Google Scholar 

  18. Jrvinen, K., Tommiska, M., Skytt, J.: Hardware Implementation Analysis of the MD5 Hash Algorithm. In: Proceedings of the 38th Hawaii International Conference on System Sciences (2005)

    Google Scholar 

  19. Chen, Z., Guo, S., Duan, R., Wang, S.: Security Analysis on Mutual Authentication against Man-in-the-Middle Attack. In: The 1st International Conference on Information Science and Engineering, ICISE 2009 (2009)

    Google Scholar 

  20. Alicherry, M., Keromytis, A.D.: DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks. IEEE (2009)

    Google Scholar 

  21. Rahman, K.A., Balagani, K.S., Phoha, V.V.: Making Impostor Pass Rates Meaningless: A Case of Snoop-Forge-Replay Attack on Continuous Cyber-behavioral Verification with Keystrokes. IEEE (2009)

    Google Scholar 

  22. http://en.wikipedia.org/wiki/Optimizationproblem

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gowraj, N., Avireddy, S., Prabhu, S. (2013). GAS: A Novel Grid Based Authentication System. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics