The Design and Implementation of Background Pass-Go Scheme Towards Security Threats
نویسندگان
چکیده
Currently, access to computer systems is often based on the use of alpha-numeric. The textual passwords or alpha-numeric passwords have been the basis of authentication systems for centuries. Similarly, it had also been the major attraction for crackers and attackers. However, users tend to face difficulty in remembering a password that is considered as secured password because this type of secured password usually has long string of characters and they appear randomly [14]. Hence, most users tend to create simple, short and insecure passwords. As a consequence, most of the time, the usability level of passwords has not achieved an optimum for a secured password [14]. In order to solve this problem, a new password scheme had been invented, known as Graphical Password System (GPS). Graphical password is an alternative mean of authentication for login intended to be used in place of conventional password; it utilizes images instead of text. In this paper, we discuss the design and intention of our proposed scheme, called Background Pass-Go (BPG). BPG is an improved version of Pass-Go, as it keeps most of the advantages of Pass-Go and achieves better usability. We had analyzed the BPG scheme in terms of 1) how BPG is able to improve other schemes of GPS especially in Pass-Go, 2) how BPG acts as a solution to different types of threats to networked computer systems. We had verified that BPG manages to overcome the shortage of other GPS schemes. Moreover, the BPG also manages to address most of the security threats for the network security system. Key-Words: BPG, Background Pass-Go, Pass-Go, GPS, Graphical Passwords System, Security.
منابع مشابه
On the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کامل