Cargando…
A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices
The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to s...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6387263/ https://www.ncbi.nlm.nih.gov/pubmed/30736448 http://dx.doi.org/10.3390/s19030678 |
_version_ | 1783397541300142080 |
---|---|
author | Ali, Adnan Rafique, Hamaad Arshad, Talha Alqarni, Mohammed A. Chauhdary, Sajjad Hussain Bashir, Ali Kashif |
author_facet | Ali, Adnan Rafique, Hamaad Arshad, Talha Alqarni, Mohammed A. Chauhdary, Sajjad Hussain Bashir, Ali Kashif |
author_sort | Ali, Adnan |
collection | PubMed |
description | The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing. |
format | Online Article Text |
id | pubmed-6387263 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-63872632019-02-26 A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices Ali, Adnan Rafique, Hamaad Arshad, Talha Alqarni, Mohammed A. Chauhdary, Sajjad Hussain Bashir, Ali Kashif Sensors (Basel) Article The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing. MDPI 2019-02-07 /pmc/articles/PMC6387263/ /pubmed/30736448 http://dx.doi.org/10.3390/s19030678 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ali, Adnan Rafique, Hamaad Arshad, Talha Alqarni, Mohammed A. Chauhdary, Sajjad Hussain Bashir, Ali Kashif A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title | A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title_full | A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title_fullStr | A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title_full_unstemmed | A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title_short | A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices |
title_sort | fractal-based authentication technique using sierpinski triangles in smart devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6387263/ https://www.ncbi.nlm.nih.gov/pubmed/30736448 http://dx.doi.org/10.3390/s19030678 |
work_keys_str_mv | AT aliadnan afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT rafiquehamaad afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT arshadtalha afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT alqarnimohammeda afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT chauhdarysajjadhussain afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT bashiralikashif afractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT aliadnan fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT rafiquehamaad fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT arshadtalha fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT alqarnimohammeda fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT chauhdarysajjadhussain fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices AT bashiralikashif fractalbasedauthenticationtechniqueusingsierpinskitrianglesinsmartdevices |