Attacks and Remedies of Authentication Techniques : A Review

Authors

  • Hiral Patil  M.Tech, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Chandresh D Parekh  Assistant Professor, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Password, Password attacks, countermeasures, Authentication methods, Conclusion.

Abstract

Most people now access all the important areas of their life banking, shopping, insurance, medical records, and so on-normally by typing a username and password into a website. A password based mechanism is the mostly used method of authentication in distributed environments. Text based passwords are not so secure enough for real-time applications. Authentication plays a major role in protecting resources against unauthorized users. But now-a-days many user authentication systems suffer from limitations and security threats. Graphical passwords use images as passwords. Human brain is good in remembering picture than text. There are various graphical password techniques or graphical password software in the market The main goal of this work is to reduce the guessing attacks as well as encouraging users to select more random, and difficult passwords to guess.

References

  1. Neha Vishwakarma, Kopal Gangrade, "Secure Image Based One Time Password", International Journal of Science and Research(IJSR), ISSN(Online): 2319-7064,Index Copernicus Value(2013):6.14|Impact Factor(2015):6.391
  2. R.V.Sudhakar1, A. Mruthyunjayam2, D.  SugunaKuamari, M. Ravi Kumar,B.V.S. Ramesh Babu5," Improving Login Authorization by Providing Graphical Password (Security)", R.V.Sudhakar et al Int. Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.484-489
  3. SurajHande, Nitin Dighade ,RuchalBhusari, MrunaliShende,Prof. Heena Agrawal "Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA" IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 124-128
  4. Savita Kamalakarrao Kulkarni" A Survey of Password Attacks, Countermeasures and Comparative Analysis of Secure Authentication Methods" International Journal on Advance Research in Computer Science and Management Studies, Volume 3,Issue 11, November 2015.(attack types)
  5. Mudassar Raza, Muhammad Iqbal, Muhammad Sharif and Waqas Haider"A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication "World Applied Sciences Journal 19 (4): 439-444, 2012.(video recording attack,replay)
  6. Ms. Jyoti Madhukar Shinde," Prevention Against Online Password Guessing Attacks Using Image Based Authentication Technique PCCP", Open Access International Journal of Science &Engineering, Volume 1, Issue 1 ,July 2016 .( Image Based Password Techniques:)
  7. S.Jothimani, P.Betty," A Survey on Image Authentication Techniques" ,International Journal of Engineering Trends and Technology (IJETT) , Volume 7 ,Number 4,Jan 2014(Existing Image Authentication Techniques watermark)

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Hiral Patil, Chandresh D Parekh, " Attacks and Remedies of Authentication Techniques : A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.720-724, November-December-2017.