Abstract
Over the years, information and network security in the field of computer is an everlasting troublesome area under discussion. Information and network security instigates with the user. The important feature of security is ‘Password Authentication.’ A human-created password comes from a small domain. It is just a matter of time for hackers to break security measures with the available computer power and tools. Online services can be accessible by using distinct passwords with varying strengths. Cracking or decoding the password has created serious challenges or threats in providing security of the information. Highly secured password generation therefore has become a challenging task. In this work, Petri net-based array password generation has been done. The methodology adapted in this paper is novel and more immune.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gehringer, E.F.: Choosing passwords: security and Human factors. In: IEEE 2002 International Symposium on Technology and Society (ISTAS’02), pp. 369–373, ISBN: 0-7803-7284-0 (2002)
Morris, R., Thompson, K.: Bell Laboratories “Password Security: A case History” Communication of ACM, vol. 22, pp. 594–597, Nov 1979
Hong, J.: Passwords getting painful, computing still blissful. Commun. ACM 56(3), March 2013
Vaithyasubramanian, S., Christy, A.: A Practice to Create user friendly secured password using CFG. In: Accepted for International Conference on Mathematical and Engineering Sciences—2014 (ICMES 2014)
Vaithyasubramanian, S., Christy, A.: A scheme to create secured random password using markov chain. In: Accepted for International Conference on Artificial intelligence and Evolutionary Algorithms in Engineering Systems—2014 (ICAEES 2014)
Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 625–632 (2008)
Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), July 2013
Adebola, O., Ithnin, N., Jali, M.Z., Akosu, N.: Graphical password Schemes design: enhancing memorability features using Autobiographical Memories. J. Theor. Appl. Inf. Technol. 53(1), 10 July 2013
Sonkar, S.K., Paikrao, R.L., Kumar, A.: Graphical password authentication scheme based on color image gallery. Int. J. Eng. Innovative Technol. (IJEIT) 2(4), October 2012
Yan, J.J., Blackwell, A.F., Anderson, R.J., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)
Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on the World Wide Web, Acm Digital Library, pp. 657–666 (2007)
AlFayyadh, B., Thorsheim, P., Jøsang, A., Klevjer, H (2012) Improving usability of password management with standardized password policies. In: The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 Cabourg, ISBN: 978-2-9542630-0-7, May 2012
http://resources.infosecinstitute.com/dictionary-attack-using-burp-suite
Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: basic results. In: Human-Computer Interaction International (HCII) (2005)
Sarohi, H. K., Khan, F. U.:Graphical password authentication schemes: current status and key issues. Int. J. Eng. Innovative Technol. (IJEIT) 10(2), No 1, March 2013
Ahmad, S.M.S., et al.: technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innovative Comput. Inf. Control 8 (11), 7983–7999, ISSN 1349-4198, November 2012
Bhatnagar, M., Jain, R.K., Khairnar, N.S.,: A survey on behavioral biometric techniques: mouse vs. keyboard dynamics. In: IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology, pp. 27–30 (2013)
Peterson, J.L.: Petri Net Theory and Modeling of systems. Prentice Hall Inc., Englewood Cliffs (1981)
Lalitha, D., Rangarajan, K.: Column and row catenation petri net systems. In: Proceeding of 5th IEEE International Conference on Bio-Inspired Computing: Theories and Applications, pp. 1382–1387 (2010)
Lalitha, D., Rangarajan, K., Thomas, D.G.: Rectangular Arrays and Petri Nets, Combinatorial Image Analysis, vol. 7655, pp. 166–180. LNCS, London (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Vaithyasubramanian, S., Christy, A., Lalitha, D. (2015). Generation of Array Passwords Using Petri Net for Effective Network and Information Security. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_20
Download citation
DOI: https://doi.org/10.1007/978-81-322-2012-1_20
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2011-4
Online ISBN: 978-81-322-2012-1
eBook Packages: EngineeringEngineering (R0)