Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Graphical-based password for user authentication in internet of things

View through CrossRef
Internet of Things has become a significant and evolving technology that cannot be avoidable in most of the sectors. However, the Internet of Things security became a concern due to the huge amount of the sensitive data that transferring through IoT resources. Secure the users' authentication process of the IoT is the first line of defense to protect the users' data from violation. Typically, the alphanumeric-based password is the popular method to authenticate the users of the IoT. But it is a vulnerable mechanism that can be violated easily. For that, this research aims to develop a graphical-based password scheme to support the traditional text password in the IoT technology. The proposed scheme is a hybrid (Two-factor) approach, based on two types of Knowledge-based Authentication method (alphanumeric-based password and graphical-based password) naming as IoT-GP. IoT-GP aims to improve the users' authentication security considering the usability enhancement. The results obtain from the conducted field study indicated that IoT-GP significantly improved the security and the usability. The results of the password entropy and password space indicated that IoT-GP obtained a high rate comparing to another schemes, which reflected on the IoT-GP ability to resist the guessing and brute force attacks.
Title: Graphical-based password for user authentication in internet of things
Description:
Internet of Things has become a significant and evolving technology that cannot be avoidable in most of the sectors.
However, the Internet of Things security became a concern due to the huge amount of the sensitive data that transferring through IoT resources.
Secure the users' authentication process of the IoT is the first line of defense to protect the users' data from violation.
Typically, the alphanumeric-based password is the popular method to authenticate the users of the IoT.
But it is a vulnerable mechanism that can be violated easily.
For that, this research aims to develop a graphical-based password scheme to support the traditional text password in the IoT technology.
The proposed scheme is a hybrid (Two-factor) approach, based on two types of Knowledge-based Authentication method (alphanumeric-based password and graphical-based password) naming as IoT-GP.
IoT-GP aims to improve the users' authentication security considering the usability enhancement.
The results obtain from the conducted field study indicated that IoT-GP significantly improved the security and the usability.
The results of the password entropy and password space indicated that IoT-GP obtained a high rate comparing to another schemes, which reflected on the IoT-GP ability to resist the guessing and brute force attacks.

Related Results

An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Usability of the login authentication process: passphrases and passwords
Usability of the login authentication process: passphrases and passwords
Purpose The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forg...
Graphical Password Authentication
Graphical Password Authentication
A pattern password is an authentication system that works when a user selects images in a specific sequence displayed on a graphical user interface (GUI). For this reason, the grap...
Efficient Plain Password Cryptanalysis Techniques
Efficient Plain Password Cryptanalysis Techniques
In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common mea...
Graphical Password Authentication For Child Personal Storage Application
Graphical Password Authentication For Child Personal Storage Application
AbstractMobile applications are very popular among the children nowadays as children use it for many purposes such as entertainment, learning or education. Keeping hand written not...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Aplikasi Pengukuran Kekuatan dan Rekomendasi Password Berdasarkan Input Pengguna dengan Metode Entropi
Penelitian ini mengembangkan aplikasi berbasis Python untuk mengevaluasi kekuatan password serta memberikan rekomendasi password yang lebih aman menggunakan alfabet fonetik NATO, T...
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel Value Graphical Password Scheme: Identifying Design Features and Requirements
Pixel value graphical password scheme was introduced with the aim to solve problems faced by users during authentication process that arising from current graphical password scheme...

Back to Top