An Improved Security Approach For User authentication

Abstract

A Key logger is software intended to imprison all of a user’s keyboard strokes, and then create use of them to mimic a user in financial transactions. Threats next to electronic and financial services can be secret into two major classes: credential stealing and channel breaking attacks. Credentials such as users’ identifiers, passwords, and keys can be stolen by an attacker when they are inadequately administered. Even if all required information is firmly delivered to a user’s computer, the attacker inhabit on that user’s computer can effortlessly scrutinize and alter the information and show valid-looking yet not to be trusted information. Human user’s contribution in the security protocol is sometimes obligatory to foil this type of attacks but humans are not good at thorny calculations and do not have a plenty memory to remember cryptographically strong keys and signatures. Our approach to resolve the dilemma is to pioneer a transitional device that bridges a human user and a terminal.

Authors and Affiliations

B. Suresh, R. Sailaja

Keywords

Related Articles

Real Time Embedded Face Recognition using ARM7

Face recognition is a widely used biological recognition technology. In comparison with other identification methods, this type of recognition has direct, friendly and convenient features. The embedded face recogniti...

An Improved Performance of MANET using AODV Protocol for Black Hole Detection

Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been propo...

Energy efficiency analysis of Compressed Sensing Video Streaming for Wireless Multimedia Sensors

Multimedia Wireless Sensor Network (MWSN) [3] provides a low-cost and flexible solution for distributed video surveillance based on low-power autonomous camera sensor nodes. The profile of these MWSN-based distribute...

Energy Efficient Group Key Management (EEGK) for Secure Data Processing in Ad Hoc and WSN Networks

WMNs have been in recent times recommended as a capable low-cost approach to provide last-mile high-speed Internet access. A typical WMN is a multihop hierarchical wireless network. A major challenge in formulating s...

Modelling of Buck-Boost Converter for Photovoltaic and Battery Power Systems

In this paper a buck-boost converter with photovoltaic (PV) and battery power for high step-up system is discussed and implemented. The motive of this project is to design a MPPT(maximum power point tracking ) Algori...

Download PDF file
  • EP ID EP28312
  • DOI -
  • Views 314
  • Downloads 4

How To Cite

B. Suresh, R. Sailaja (2015). An Improved Security Approach For User authentication. International Journal of Research in Computer and Communication Technology, 4(11), -. https://europub.co.uk/articles/-A-28312