ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AUTHENTICATION WITH ENHANCED PRIVACY USING FILE STREAM SEQUENCING TECHNIQUE

Journal: International Journal of Computer Techniques (Vol.2, No. 2)

Publication Date:

Authors : ; ;

Page : 156-162

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Authentication is the most common and essential Service of Information Security. User authentication protocol plays a vital role in payment schemes. The main concept of oPass is to free users from having to remember or type any passwords into conventional computers for authentication. Unlike generic user authentication, oPass involves a component which is used to generate one-time passwords and a communication channel, mail ids which is used to transmit authentication messages. In our opinion, it is difficult to thwart password reuse attacks from any scheme where the users have to remember something. We also state that the main cause of stealing password attacks is when users type passwords to untrusted public computers. In order to make the communication more secure, the user logins by providing the graphical password. This graphical password is stored in the database when the user registers his/her account. This graphical password is limited to a certain pixels. When the user logins, he/she has to provide the graphical password of the given pixels. If the graphical password provided matches with the password stored in database, then the user is recognized as an authorized user. Else the user’s access will be denied since he is an authorized person. We propose RACE, a Report-based payment scheme for MWNs. The nodes submit lightweight payment reports (instead of receipts) to the AC to update their credit accounts, and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards of different sessions without security proofs, e.g., signatures. The AC verifies the payment by investigating the consistency of the reports, and clears the payment of the fair reports with almost no cryptographic operations or computational overhead. For cheating reports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports, e.g., to steal credits or pay less

Last modified: 2015-07-09 15:44:59