THREE DIMENSIONAL AUTHENTICATION MECHANISMS FOR SECURED TRANSFER OF DATA IN NETWORKS

The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this system, multifactor authentication scheme is proposed. In the three dimensional virtual environment the authentication is given by interacting with the various objects and the user navigation is carried out through the objects. The sequence of actions and interactions towards the objects inside this environment constructs three dimensional passwords. The three dimensional password combines most existing authentication schemes such as Textual passwords, Graphical passwords, Biometrics to give more security for the sensitive data transactions. If all the three password matches, then the authorized user can transmit the data as well as receiver can receive the data. For the network security the data is encrypted before transmission. The receiver can decrypt the data and access the file. The proposed research work is implemented using VB.Net 2008 as front end and MS SQL Server 2005 as back end.

[1]  Dawei Hong,et al.  A Shoulder-Surfing Resistant Graphical Password Scheme - WIW , 2003, Security and Management.

[2]  Julie Thorpe,et al.  Graphical Dictionaries and the Memorable Space of Graphical Passwords , 2004, USENIX Security Symposium.

[3]  Chun-I Fan,et al.  Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Eun-Jun Yoon,et al.  A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems , 2005, KES.

[5]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[6]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[7]  Kee-Young Yoo,et al.  ID-based password authentication scheme using smart cards and fingerprints , 2003, OPSR.

[8]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[9]  Elisa Bertino,et al.  Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.

[10]  Ted Taekyoung Kwon,et al.  An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart Cards , 2006, ICCSA.

[11]  Julie Thorpe,et al.  Towards secure design choices for implementing graphical passwords , 2004, 20th Annual Computer Security Applications Conference.

[12]  Ed Dawson,et al.  BAAI: biometric authentication and authorization infrastructure , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[13]  Michael Scott,et al.  Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints , 2004, OPSR.

[14]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[15]  David Taniar,et al.  Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I , 2006, ICCSA.