Security analysis and implementation of JUIT-Image Based Authentication system using Kerberos protocol

被引:5
|
作者
Nitin, Del [1 ]
Chauhan, Durg Singh [2 ]
Sehgal, Vivek Kumar [3 ]
Mahanot, Ankit [1 ]
Singh, Pallavi [1 ]
Ahuja, Sohit [1 ]
Shrivastava, Utkarsh [1 ]
Rana, Manisha [1 ]
Punjabi, Vineet [1 ]
Vinay, Shivam [1 ]
Sharma, Nakul [4 ]
机构
[1] Jaypee Univ Informat Technol, Dept CSE & IT, Solan 173215, HP, India
[2] Jaypee Univ Informat Technol, Solan 173215, India
[3] Jaypee Univ Informat technol, Dept ECE, Solan 173215, India
[4] HCL Technol, Noida, India
关键词
D O I
10.1109/ICIS.2008.93
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. IBA encapsulates Kerberos Protocol, Version 5, and provides clients a completely unique and secured authentication tool to work on. This paper is a comprehensive study on the subject of using images as the password set and the implementation of Jaypee University of Information Technology (JUIT) IBA system called as JUIT-IBA. This tool provides a secure channel of communication between the communicating entities. The assortment of image set as client's password aims at thwarting Brute Force attacks, Shoulder attack, and Tempest attack at the client side while the attacks at the server side can be averted by putting into practice Kerberos protocol. It also describes how our system works along with the evaluation of its performances in different computing environments.
引用
收藏
页码:575 / +
页数:2
相关论文
共 50 条
  • [1] On a Software Architecture of JUIT-Image Based Authentication System
    Nitin
    Chauhan, Durg Singh
    Sehgal, Vivek Kumar
    [J]. WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, : 35 - +
  • [2] A Network Authentication Protocol Based on Kerberos
    El-Emam, Eman
    Koutb, Magdy
    Kelash, Hamdy
    Allah, Osama Farag
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 17 - 26
  • [3] Security-Enhanced SDN Controller Based. Kerberos Authentication Protocol
    Mutaher, Hamza
    Kumar, Pradeep
    [J]. 2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 672 - 677
  • [4] Security Analysis of the Kerberos protocol using BAN logic
    Fan, Kai
    Li, Hui
    Wang, Yue
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +
  • [5] Security analysis of Kerberos protocol based on SPEAR II
    Zhang, Chen
    Gao, Xiao-Liang
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2015, 37 (10): : 2292 - 2297
  • [6] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    [J]. Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [7] A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
    Sutradhar, Mukti Rani
    Sultana, Nigar
    Dey, Himel
    Arif, Hossain
    [J]. 2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 239 - 244
  • [8] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    [J]. ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [9] Security analysis of Kerberos protocol based on the strand space model
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    [J]. Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914
  • [10] FPGA Implementation of Mutual Authentication Protocol for Medication Security System
    Lin, Wei-Chen
    Huang, Po-Kai
    Pan, Chung-Long
    Huang, Yu-Jung
    [J]. JOURNAL OF LOW POWER ELECTRONICS AND APPLICATIONS, 2021, 11 (04)