TCpC: a graphical password scheme ensuring authentication for IoT resources

被引:0
作者
Matta P. [1 ]
Pant B. [1 ]
机构
[1] Department of Computer Science and Engineering, Graphic Era University, 566/6, Bell Road, Clement Town, Dehradun
关键词
Authentication; Confidentiality; Graphical password; Internet-of-Things; Security; Security triad;
D O I
10.1007/s41870-018-0142-z
中图分类号
学科分类号
摘要
In last few years, information world has come across one of the most appealing paradigms, namely Internet-of-Things (IoT). Both the industry as well as the academia is fascinated by the open issues and research challenges of Internet-of-Things. The enormity in the development, expansion, and advantages of the paradigm is unbelievable, and this results in the transition of the information world to this paradigm. At the same time, it raises the security concerns along with many other open issues towards the paradigm. This paper specifically focuses on the confidentiality component out of the three components of security triad, namely confidentiality, integrity and availability. Although researchers have high interest towards all the three components, but the questions posed by many researchers, academicians and end users raise major issues over ‘confidentiality’. Confidentiality is all about guaranteeing the authentic access to a piece of information or a service or even a resource, to a particular individual or computing device. The resource in question may be one of the resources of an IoT system. This can be achieved by deploying some authentication techniques. Here we discuss various types of authentication techniques, purposely putting our emphasis on one of the well-known authentication technique, viz. passwords. This work reviews the existing techniques, their drawbacks and claimed advantages of the upcoming password techniques. It also surveys some of the supportive methods for the naïve users of password techniques. This paper aims at classifying, comparing and encapsulating the problems, demanded solutions and suggestions from relevant published technical and review articles in the field of authentication. This paper particularly highlights graphical password schemes. This proposes a naïve graphical password scheme to assure the authentic access of IoT resources, namely TCpC. At the end we have mentioned the advantages of TCpC over other authentication schemes. We have also compared and analyzed the different proposed password schemes with our technique. © 2018, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:699 / 709
页数:10
相关论文
共 26 条
[1]  
News Search and Analytics, (2017)
[2]  
(2017)
[3]  
Feruza Y.S., Kim T., IT security review: privacy, protection, access control, assurance and system security, Int J Multimed Ubiquitous Eng, 2, 2, pp. 17-31, (2007)
[4]  
Wikipedia [Online]., (2017)
[5]  
Bridges K., Illustrated Dictionary of Information System Management, (2006)
[6]  
Techtarget [Online], (2017)
[7]  
Patel D.R., Information security: theory and practice, (2008)
[8]  
Alsulaiman A.F., Saddik A.E., Three-dimensional password for more secure authentication, IEEE Trans Instrum Meas, 57, 9, pp. 1929-1938, (2008)
[9]  
Waern Y., McDonald S., Cockton G., People and computers XIV—usability or else!, Proceedings of HCI, (2000)
[10]  
Corn T.S., Juels A., Triandopoulos N., Methods and Apparatus for Knowledge-Based Authentication Using Historically-Aware Questionnaires, (2015)