Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 5
Abstract
Knowledge based authentication schemes are divided into textual password schemes and graphical password schemes. Textual password schemes are easy to use but have well known security issues, such as weak against online security attacks. Graphical password schemes are generally weak against shoulder surfing attacks. Usability is another issue with most of the graphical password schemes. For improving security of knowledge-based authentication schemes complex password entry procedures are used, which improve security but weakens useability of the authentication schemes. In order to resolve this security and usability conflict, a user authentication scheme is proposed, which contains one registration and two login screens called easy and secure login screens. Easy login screen provides easy and quick way of authentication while secure login screen is resilient to different online security attacks. A user has to decide based upon the authentication environment, which login screen to be used for authentication. For secure environment, where chances of security attacks are less easy login screen is recommended. For insecure environments where chances of security attacks are high, secure login screen is recommended for authentication. In the proposed scheme, image based passwords can also be set along with alphanumeric passwords. Results suggest that proposed scheme improves security against offline and online attacks.
Authors and Affiliations
Shah Zaman Nizamani, Waqas Ali Sahito, Shafique Awan
The Ethical and Social Issues of Information Technology: A Case Study
The present study is conducted among 283 students from University of Zabol to identify the harm and ethical and social issues in the field of information technology and to classify the immoral practices that students are...
Design of ANFIS Estimator of Permanent Magnet Brushless DC Motor Position for PV Pumping System
This paper presents a new scheme for PMBLDC (permanent magnet brushless direct current) rotor position estimation based an ANFIS (adaptive network fuzzy inference system) estimator. The operation of such motor requires a...
High Precision DCT CORDIC Architectures for Maximum PSNR
This paper proposes two optimal Cordic Loeffler based DCT (Discrete Cosine Transform algorithm) architectures: a fast and low Power DCT architecture and a high PSNR DCT architecture. The rotation parameters of CORDIC ang...
The Proposed Model to Increase Security of Sensitive Data in Cloud Computing
There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest,...
Detection of Suspicions of Varicose Veins in the Legs using Thermal Imaging
Varicose veins also known as venous insufficiency, are dilated veins due to an accumulation of blood that occurs in different parts of the body, the most common are in the legs, in addition to having a higher index in wo...