EAM: Architecting Efficient Authentication Model for Internet Security Using Image-Based One Time Password Technique

EAM: Architecting Efficient Authentication Model for Internet Security Using Image-Based One Time Password Technique

ISSN (Print) : 0974-6846 Indian Journal of Science and Technology, Vol 9(7), DOI: 10.17485/ijst/2016/v9i7/85017, February 2016 ISSN (Online) : 0974-5645 EAM: Architecting Efficient Authentication Model for Internet Security using Image-Based One Time Password Technique A. Jesudoss1* and N. P. Subramaniam2 1Faculty of Computer Science and Engineering, Sathyabama University, Chennai – 600119, Tamil Nadu, India; [email protected], [email protected] 2Department of EEE, Pondicherry Engineering College, Puducherry – 605014, Tamil Nadu, India; [email protected] Abstract In the era of Internet world, passwords are essential to protect our data and the application. Relying on a simple plaintext password would lead to vulnerability. Apart from choosing strong passwords, the authentication model plays a crucial Objectives: The role in Internet Security by protecting the web applications efficiently from various security attacks. aim of the paper is to provide an Efficient Authentication Model and adopt a new techniqueMethods: in generatingThe One Time a dynamic Password salt from the client. Hence it protects Internet applications from five types of security attacks, namely password-guessing attack, keylogger attack,Findings: replay attack, streaming bots, and screen-capture attacks. between(OTP) based the clientimage-selection and the server. enables The thedependency user to protect on hardware the Internet devices application for authentication from streaming can be completely bots, keyloggers eradicated and screen-capture attacks. The architecture has been designed efficiently to minimize the number of transactions higher levels of security. Application: It is a single solution for multiple security problems with minimal cost and highly by using Efficient Authentication Model (EAM). Hence, the authentication is well-suited for Internet applications requiring secured with improved performance. Hence, it can be implemented by banks, financial organization, etc. where security is veryKeywords significant.: Authentication – Keylogger – Replay Attack – Password-Guessing Attack –Streaming Bots – Screen-Capture Attack 1. Introduction fact, there is no complex algorithm involved or expensive hardware devices used but it could eliminate the attacker When advanced technologies or complex algorithms are even if the primary password is stolen. Though the idea is used for an authentication model, it adds more overhead simple, it is very effective and efficient. to the model1. Therefore usability and security should be In the Internet World, there are millions of tools avail- balanced efficiently. An efficient authentication model able for breaching the security. It is essential to know how is not the one that uses latest technologies or the one these tools and concepts are used in breaching the Internet that uses expensive hardware devices or complex algo- Security. For Instance, Screen Scraper is a software that rithms. It is the one that provides utmost security in a takes the screenshot of the victim computer periodically2. simple usable way with a less time, resource and effort. Keyloggers are common among Internet users for share For instance, nowadays banks are using mobile One Time the computer resource such as memory and processor Password (OTP) for secondary authentication. The idea with other running programs. It does not attract user’s here is simple; it is just sharing a secret over the mobile. In attention as it remains silent and invisible. It is clearly *Author for correspondence EAM: Architecting Efficient Authentication Model for Internet Security using Image-Based One Time Password Technique shown3 how unprivileged processes run keyloggers and is has proved to be better than public key cryptography as it designed completely as a black-box model. By correlating has smaller key size. It showed that the system has vulner- the input and the output of the keylogger, the behavior ability to password-guessing attack, the Denial of Service of the keyloggers is well-studied. Keylogger has become (DoS) attack, and the replay attack. It also shows that the very common these days. Most of the attacks are keylog- hardware devices are not a solution for avoiding attacks. ger based. A Keylogger helps to impersonate a legitimate The biometric information can be captured at the fake user. To mitigate the keylogger attack, the keyboard banking terminals11. Therefore, Biometric authentication Interrupt Vector Table (IVT) has to be modified4. The has been proved to be vulnerable as the biometric infor- authors opine that designing an authentication protocol mation is used for impersonation. The author insists the is quite challenging. Further, the author says that when need for hiding information or credentials. A part of the the human beings are involved in authentication process, authentication process must be hidden from the prying it affects the usability of the authentication. In fact, they eyes. The hardware devices cannot be trusted fully for have their limitations in computation and in memorizing the purpose of authentication or cryptography. Hardware the information. Trojan Attacks12 showed that implementation of hardware Graphical passwords are alternatives to textual ones. devices does not ensure security. Therefore, the above It is easy to remember graphical passwords. The vul- points about the biometric authentication and hard- nerabilities that exist for the textual password are also ware devices for authentication insist the facts that the applicable to graphical passwords5. Therefore, we need hardware devices are also vulnerable to various attacks. the combination of image-based and textual information Investing money on hardware devices will not ensure for providing the password. The proposed work focuses security at any cost. This motto had been the basic logic on this aspect. In Passfaces scheme, a recognition-based for developing the proposed work based on human intel- graphical password scheme, the user has to select a set of lectualness. faces for each round6. The set of faces selected for each A CopyCat attack is an attack which simply captures round will be used for creating a password. In order to the packet and forwards it with or without minor changes login successfully, the user should select correct faces in in the packet13. It showed how the copycat attack can be every round. The set of images are the same but displayed handled. It just sends the replicas of already transmitted in different positions. It is prone to password-guessing packets so the router will be confused with the replicas. attacks. In recall-based scheme, the user has to draw the Elastic Password Authentication Scheme14 introduced a password. These graphical password schemes are vulner- new concept called Wheel Lock which protects against able to shoulder-surfing attack. shoulder surfing attack, brute force attack, etc. The secu- Honey Encryption technique is a technique that gen- rity functions are based on the technology as well as the erates some message even though the key or the password human factors15. Once again, authors have insisted that entered is wrong7. Therefore, it misleads the attacker and human factors must have higher priority than the tech- prevents them from attempting further. The methodol- nological factors. ogy8 indicates how the password-guessing attack can be Noisy Password Security Technique16 indicated how handled. They also says that the IP addresses should not different noise patterns can be inserted into One Time blacklisted, for it will consume huge memory or some- Password (OTP) scheme and makes it more effective times even legitimate users may get caught in the blacklist. than the traditional One Time Password (OTP). This The authentication scheme9 points out how the password alleviates shoulder surfing attack and the password is can be obtained using offline password guessing attack. dynamic and unique per transaction. OTP-Based Two In this case, the password is simply hashed and hence it Factor Authentication Scheme17 provided an alternative is easy to run brute-force attack on it. The proposed work method for providing One Time Password (OTP). The shows that the salt should be appended to the password to One Time Password (OTP) is generated from the initial make it very complex. seed value and is dynamic every time. Two-Factor Smart The three-factor security protocol10 explained about Card-Based Authentication Scheme18 suggested another securing the Universal Serial Bus (USB) devices. It is multifactor authentication model that uses smart card. based on Elliptic Curve Cryptography (ECC) smart card The authentication scheme for remote access in intelligent and biometric system. Elliptic Curve Cryptography (ECC) home networks19 proposed a One Time Password-based 2 Vol 9 (7) | February 2016 | www.indjst.org Indian Journal of Science and Technology A. Jesudoss and N. P. Subramaniam (OTP-based) user authentication scheme for home 3. Proposed Work networks. In this scheme, two-factor authentication is provided and key distribution is made without any First, the client and the server should be synchronized shared secret. Integrated User Authentication Method20 with time using Network Time Protocol. The client enters provides a solution for managing authentication informa- the Uniform Resource Locator (URL) on the browser tion over multiple clouds while balancing the safety and and the appropriate web application is displayed on convenience of the user. The latest Freak Attack21 is an the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us