Cargando…

A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices

The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to s...

Descripción completa

Detalles Bibliográficos
Autores principales: Ali, Adnan, Rafique, Hamaad, Arshad, Talha, Alqarni, Mohammed A., Chauhdary, Sajjad Hussain, Bashir, Ali Kashif
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6387263/
https://www.ncbi.nlm.nih.gov/pubmed/30736448
http://dx.doi.org/10.3390/s19030678
_version_ 1783397541300142080
author Ali, Adnan
Rafique, Hamaad
Arshad, Talha
Alqarni, Mohammed A.
Chauhdary, Sajjad Hussain
Bashir, Ali Kashif
author_facet Ali, Adnan
Rafique, Hamaad
Arshad, Talha
Alqarni, Mohammed A.
Chauhdary, Sajjad Hussain
Bashir, Ali Kashif
author_sort Ali, Adnan
collection PubMed
description The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing.
format Online
Article
Text
id pubmed-6387263
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-63872632019-02-26 A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices Ali, Adnan Rafique, Hamaad Arshad, Talha Alqarni, Mohammed A. Chauhdary, Sajjad Hussain Bashir, Ali Kashif Sensors (Basel) Article The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing. MDPI 2019-02-07 /pmc/articles/PMC6387263/ /pubmed/30736448 http://dx.doi.org/10.3390/s19030678 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ali, Adnan
Rafique, Hamaad
Arshad, Talha
Alqarni, Mohammed A.
Chauhdary, Sajjad Hussain
Bashir, Ali Kashif
A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title_full A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title_fullStr A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title_full_unstemmed A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title_short A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
title_sort fractal-based authentication technique using sierpinski triangles in smart devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6387263/
https://www.ncbi.nlm.nih.gov/pubmed/30736448
http://dx.doi.org/10.3390/s19030678
work_keys_str_mv AT aliadnan afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT rafiquehamaad afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT arshadtalha afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT alqarnimohammeda afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT chauhdarysajjadhussain afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT bashiralikashif afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT aliadnan fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT rafiquehamaad fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT arshadtalha fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT alqarnimohammeda fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT chauhdarysajjadhussain fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices
AT bashiralikashif fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices