Improvement of Shoulder-Surfing Resistant Authentication Method Using Hybrid Images
Volume 5, Issue 4 Yutaka Hirakawa, Kai Motojima
Published online:26 August 2019
Article Views: 36
Abstract
In the current research, Software Defined Network (SDN) is implemented and tested on campus networks to build a framework for easier and manageable, more extensive networks. SKRU deployed ONC software from Ruijie for network administration. The current study also defines the Internet of Things (IoT) devices among faculty, including IoT for Smart farm from agriculture faculty. In an SDN architecture, the ability to configure, manage, secure, and optimize network resources via software affords many benefits to enterprises. This article is contextualized from the concept of the IoT, its security, the interoperability of VLANs, and software-defined networks. By taking into account existing architectures and technologies, intelligent infrastructure is proposed to support all processes. Based on the implementation and evaluation of SDN, valuable insights and research directions are discussed.
Reference
D. Bhattacharyya, R. Ranjan, F. Alisherov, and M. Choi, “Biometric authentication: A review,” International Journal of u-Service and e-Service, Science and Technology, vol. 2, no. 3, pp. 13–28, 2009.
F. J. Yang, “The user interface design of an intelligent tutoring system for relational database schema normalization,” International Journal of Technology and Engineering Studies, vol. 2, no. 3, pp. 70–75, 2016. doi: https://doi.org/10.20469/ijtes.2.40002-3
A. Papadopoulos, T. Nguyen, E. Durmus, and N. Memon, “IllusionPIN: Shoulder-surfing resistant authentication using hybrid images,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 12, pp. 2875–2889, 2017. doi: https://doi.org/10.1109/tifs.2017.2725199
V. Roth, K. Richter, and R. Freidinger, “A PIN-entry method resilient against shoulder surfing,” in Proceedings of the 11th ACM Conference on Computer and Communications Security, Washigton, DC, WA, 2004.
H. Zhao and X. Li, “S3pas: A scalable shoulder-surfing resistant textual-graphical password authentication scheme,” in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW-07). Ontario, CA, 2007.
S. Sakurai and T. Munaka, “Resistance evaluation of user authentication method using matrix against shoulder surfing,” IPSJ Transaction, vol. 49, no. 9, pp. 3038–3051, 2008.
Y. Hirakawa, “Random board: Password authentication method with tolerance to video-recording attacks,” International Journal of Innovation, Management and Technology, vol. 4, no. 5, pp. 455–460, 2013. doi: https://doi.org/10.7763/ijimt.2013.v4.441
Y. Hirakawa, K. Kurihara, and K. Ohzeki, “Borderless interface for user authentication method tolerant against multiple video-recording attacks,” in International Conference on Computer Systems, Electronics and Control (ICCSEC), Liaoning, China, 2017.
M.-K. Lee, H. Nam, and D. K. Kim, “Secure bimodal PIN-entry method using audio signals,” Computers & Security, vol. 56, pp. 140–150, 2016. doi: https://doi.org/10.1016/j.cose.2015.06.006
M. Ishizuka and T. Takada, “CCC: Repeated observation attack resilient PIN authentication system using vibration,” IPSJ Transaction, vol. 56, no. 9, pp. 1877–1888, 2015.
T. Kuribara, B. Shizuki, and J. Tanaka, “Vibrainput,” in Proceedings of the Extended Abstracts of the 32nd Annual ACM Conference on Human Factors in Computing Systems, Toronto, CA, 2014.
Y. Hirakawa, , F. Hirose, I. Sasano, and and, “PVRotate: An improved vibration-based user authentication method,” International Journal of Future Computer and Communication, vol. 8, no. 2, pp. 50–54, 2019. doi: https://doi.org/10.18178/ijfcc.2019.8.2.539
Y. Hirakawa, T. Itoh, and K. Ohzeki, “A new numerical password authentication method,” International Journal of Information Technology and Computer Science, vol. 12, no. 5, pp. 7–15, 2013.
J. Kondo, M. Hirano, and N. Kamiya, “Rm-001: The strong authentic method by voice navigation and relative value input eventing from peeping attack: Invisible authentication,” FIT Forum, vol. 10, no. 4, pp. 33–38, 2011.
A. Oliva, A. Torralba, and P. G. Schyns, “Hybrid images,” ACM Transactions on Graphics, vol. 25, no. 3, pp. 527–532, 2006. doi: https://doi.org/10.1145/1141911.1141919
ImageJ. Image processing and analysis in java. [Online]. Available: https://bit.ly/2YHY6Kp
To Cite this article
Y. Hirakawa and K. Motojima, “improvement of shoulder-surfing resistant authentication method using hybrid images,” International Journal of Technology and Engineering Studies, vol. 5, no. 4, pp. 113–120, 2019.