30-08-2014, 02:13 PM
THREE DIMENSIONAL AUTHENTICATION MECHANISMS
FOR SECURED TRANSFER OF DATA IN NETWORKS
THREE DIMENSIONAL.pdf (Size: 389.46 KB / Downloads: 25)
Abstract -
The current authentication systems suffer from
many weaknesses during the transmission of sensitive data
across the clients. Textual passwords are commonly used.
Users tend to choose meaningful words from dictionaries,
which make textual passwords easy to break and vulnerable
to dictionary or brute force attacks. Many available graphical
passwords have a password space that is less than or equal to
the textual password space. Many biometric authentications
have been proposed. However, users tend to resist using
biometrics because of their intrusiveness and the effect on
their privacy. Moreover, biometrics cannot be revoked. In
this system, multifactor authentication scheme is proposed. In
the three dimensional virtual environment the authentication
is given by interacting with the various objects and the user
navigation is carried out through the objects. The sequence of
actions and interactions towards the objects inside this
environment constructs three dimensional passwords. The
three dimensional password combines most existing
authentication schemes such as Textual passwords, Graphical
passwords, Biometrics to give more security for the sensitive
data transactions. If all the three password matches, then the
authorized user can transmit the data as well as receiver can
receive the data. For the network security the data is
encrypted before transmission. The receiver can decrypt the
data and access the file. The proposed research work is
implemented using VB.Net 2008 as front end and MS SQL
Server 2005 as back end.
INTRODUCTION
Network security involves the authorization of access to
data in a network, which is controlled by the network
administrator. Users choose or are assigned an ID and
password or other authenticating information that allows them
access to information and programs within their authority.
Network Security and Cryptography is a concept to protect
network and data transmission over wireless network. Data
Security is the main aspect of secure data transmission over
unreliable network. Data Security is a challenging issue of data
communications today that touches many areas including
secure communication channel, strong data encryption
PROBLEM DEFINITION
Textual passwords are commonly used in existing systems.
However, users do not follow their requirements. Users tend to
choose meaningful words from dictionaries, which make
textual passwords easy to break and vulnerable to dictionary or
brute force attacks. Graphical passwords require space to be
stored in the database. Since ,each user need separate graphical
image In assessing the system biometric based the privacy of
the user has been stolen. The authentication scheme has its
disadvantages based on several factors such as consistency,
uniqueness, and acceptability. One of the main drawbacks of
applying is its intrusiveness upon a user’s personal
characteristic. The following are the pitfalls that are identified
as demerits:
CONCLUSION
The three dimensional password is a multifactor
authentication scheme that combines these various
authentication schemes into a single 3-D virtual
environment. Therefore, the resulted password space
becomes very large compared to any existing
authentication schemes. The design of the 3-D virtual
environment, the selections of objects inside the
environment, and the object’s type reflect the resulted
password space.
Additionally, designing a simple and easy to use
3-D virtual environment is a factor that leads to a higher
user acceptability of a three dimensional password system.
A user who prefers to remember and recall a password
might choose textual and graphical passwords. For more
security bio-metric is also used for secure transaction. This
system is user friendly so everyone can use easily. Proper
documentation is provided. The end user can easily
understand how the whole system is implemented by going
through the documentation. The system is tested,
implemented and the performance is found to be
satisfactory. All necessary output is generated. Thus, the
project is completed successfully.