Generation of Array Passwords Using Petri Net for Effective Network and Information Security

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 308)


Over the years, information and network security in the field of computer is an everlasting troublesome area under discussion. Information and network security instigates with the user. The important feature of security is ‘Password Authentication.’ A human-created password comes from a small domain. It is just a matter of time for hackers to break security measures with the available computer power and tools. Online services can be accessible by using distinct passwords with varying strengths. Cracking or decoding the password has created serious challenges or threats in providing security of the information. Highly secured password generation therefore has become a challenging task. In this work, Petri net-based array password generation has been done. The methodology adapted in this paper is novel and more immune.


Petri net Authentication Password Alphanumeric Graphical Biometric Limitations Information security Network security 


  1. 1.
    Gehringer, E.F.: Choosing passwords: security and Human factors. In: IEEE 2002 International Symposium on Technology and Society (ISTAS’02), pp. 369–373, ISBN: 0-7803-7284-0 (2002)Google Scholar
  2. 2.
    Morris, R., Thompson, K.: Bell Laboratories “Password Security: A case History” Communication of ACM, vol. 22, pp. 594–597, Nov 1979Google Scholar
  3. 3.
    Hong, J.: Passwords getting painful, computing still blissful. Commun. ACM 56(3), March 2013Google Scholar
  4. 4.
    Vaithyasubramanian, S., Christy, A.: A Practice to Create user friendly secured password using CFG. In: Accepted for International Conference on Mathematical and Engineering Sciences—2014 (ICMES 2014)Google Scholar
  5. 5.
    Vaithyasubramanian, S., Christy, A.: A scheme to create secured random password using markov chain. In: Accepted for International Conference on Artificial intelligence and Evolutionary Algorithms in Engineering Systems—2014 (ICAEES 2014)Google Scholar
  6. 6.
    Sabzevar, A.P., Stavrou, A.: Universal multi-factor authentication using graphical passwords. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 625–632 (2008)Google Scholar
  7. 7.
    Gao, H., Jia, W., Ye, F., Ma, L.: A survey on the use of graphical passwords in security. J. Softw. 8(7), July 2013Google Scholar
  8. 8.
    Adebola, O., Ithnin, N., Jali, M.Z., Akosu, N.: Graphical password Schemes design: enhancing memorability features using Autobiographical Memories. J. Theor. Appl. Inf. Technol. 53(1), 10 July 2013Google Scholar
  9. 9.
    Sonkar, S.K., Paikrao, R.L., Kumar, A.: Graphical password authentication scheme based on color image gallery. Int. J. Eng. Innovative Technol. (IJEIT) 2(4), October 2012Google Scholar
  10. 10.
    Yan, J.J., Blackwell, A.F., Anderson, R.J., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)Google Scholar
  11. 11.
    Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on the World Wide Web, Acm Digital Library, pp. 657–666 (2007)Google Scholar
  12. 12.
    AlFayyadh, B., Thorsheim, P., Jøsang, A., Klevjer, H (2012) Improving usability of password management with standardized password policies. In: The Seventh Conference on Network and Information Systems Security—SAR-SSI 2012 Cabourg, ISBN: 978-2-9542630-0-7, May 2012Google Scholar
  13. 13.
  14. 14.
    Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: basic results. In: Human-Computer Interaction International (HCII) (2005)Google Scholar
  15. 15.
    Sarohi, H. K., Khan, F. U.:Graphical password authentication schemes: current status and key issues. Int. J. Eng. Innovative Technol. (IJEIT) 10(2), No 1, March 2013Google Scholar
  16. 16.
    Ahmad, S.M.S., et al.: technical issues and challenges of biometric applications as access control tools of information security. Int. J. Innovative Comput. Inf. Control 8 (11), 7983–7999, ISSN 1349-4198, November 2012Google Scholar
  17. 17.
    Bhatnagar, M., Jain, R.K., Khairnar, N.S.,: A survey on behavioral biometric techniques: mouse vs. keyboard dynamics. In: IJCA Proceedings on International Conference on Recent Trends in Engineering and Technology, pp. 27–30 (2013)Google Scholar
  18. 18.
    Peterson, J.L.: Petri Net Theory and Modeling of systems. Prentice Hall Inc., Englewood Cliffs (1981)Google Scholar
  19. 19.
    Lalitha, D., Rangarajan, K.: Column and row catenation petri net systems. In: Proceeding of 5th IEEE International Conference on Bio-Inspired Computing: Theories and Applications, pp. 1382–1387 (2010)Google Scholar
  20. 20.
    Lalitha, D., Rangarajan, K., Thomas, D.G.: Rectangular Arrays and Petri Nets, Combinatorial Image Analysis, vol. 7655, pp. 166–180. LNCS, London (2012)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Sathyabama UniversityChennaiIndia

Personalised recommendations