Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 7, Pages: 1-8
A. Jesudoss1* and N. P. Subramaniam2
1Faculty of Computer Science and Engineering, Sathyabama University, Chennai – 600119, Tamil Nadu, India; [email protected], [email protected] 2Department of EEE, Pondicherry Engineering College, Puducherry – 605014, Tamil Nadu, India; [email protected]
*Author for Correspondence
Faculty of Computer Science and Engineering, Sathyabama University, Chennai – 600119, Tamil Nadu, India; [email protected]
In the era of Internet world, passwords are essential to protect our data and the application. Relying on a simple plaintext password would lead to vulnerability. Apart from choosing strong passwords, the authentication model plays a crucial role in Internet Security by protecting the web applications efficiently from various security attacks. Objectives: The aim of the paper is to provide an Efficient Authentication Model and adopt a new technique in generating a dynamic salt from the client. Hence it protects Internet applications from five types of security attacks, namely password-guessing attack, keylogger attack, replay attack, streaming bots, and screen-capture attacks. Methods: The One Time Password (OTP) based image-selection enables the user to protect the Internet application from streaming bots, keyloggers and screen-capture attacks. Findings: The architecture has been designed efficiently to minimize the number of transactions between the client and the server. The dependency on hardware devices for authentication can be completely eradicated by using Efficient Authentication Model (EAM). Hence, the authentication is well-suited for Internet applications requiring higher levels of security. Application: It is a single solution for multiple security problems with minimal cost and highly secured with improved performance. Hence, it can be implemented by banks, financial organization, etc. where security is very significant.
Keywords: Authentication – Keylogger – Replay Attack – Password-Guessing Attack –Streaming Bots – Screen-Capture Attack
Subscribe now for latest articles and news.