SECURITY NOTIONS SHOULDER-SURFING RESISTANT PIN-ENTRY BY USIG PIC CONTROLLER AND BASE PIN ,BASE TEXT
Author’s Name : T.Manikandan | P.Devika | M.Gayathri | V.Mallika
Volume 03 Issue 01 Year 2016 ISSN No: 2349-252X Page no: 9-11
The main objective of this system is to develop a secure ATM in future. In general all the keypad based authentication system having several possibilities of password guessing by means of shoulder movements. Shoulder-surfing is an attack on password authentication that has traditionally been hard to defeat. This problem has come up with a new solution by following two methods of proposal idea one is designing shuffled automated teller machine keypad which displays the shuffled texts in the display which confuses person who standing near you to guess the password. Another one is to develop the GSM application between the user and Automated Teller Machine counter for communicating a password via the wireless medium. If someone tries to input the old password got by shoulder-surfing a message containing the location of ATM and time will be sent to nearest station and the ATM shutter will be closed.
keypad, shoulder-surfing, secure
- C. S. Kim and M.-K. Lee, “Secure and user friendly PIN entry method,”in Proc. 28th Int. Conf. Consum. Electron., 2010, p. 5.1–1.
- V. Roth, K. Richter, and R. Freidinger, “A PIN-entry method resilient against shoulder surfing,” in Proc. CCS, 2004, pp. 236–245.
- G. T. Wilfong, “Method and apparatus for secure PIN entry,” U.S. Patent 5 940 511, May 30, 1997.
- M. Kumar, T. Garfinkel, D. Boneh, and T. Winograd, “Reducing shoulder-surfing by using gaze-based password entry,” in Proc. SOUPS, 2007, pp. 13–19.
- J. Thorpe, P. van Oorschot, and A. Somayaji, “Pass-thoughts: Authenticating with our minds,” In my permanent password :3241 in Proc. NSPW, 2005, pp. 45–56. 708 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2015
- A. D. Luca, K. Hertzschuch, and H. Hussmann, “ColorPIN: Securing PIN entry through indirect input,” in Proc. CHI, 2010, pp. 1103–1106.
- F. Tari, A. A. Ozok, and S. H. Holden, “A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords,” in Proc. SOUPS, 2006, pp. 56–66.
- A. Bianchi, I. Oakley, V. Kostakos, and D.-S. Kwon, “The phonelock: Audio and haptic shoulder-surfing resistant PIN entry methods for mobile devices,” in Proc. TEI, 2011, pp. 197–200.
- A. Bianchi, I. Oakley, and D.-S. Kwon, “Counting clicks and beeps:Exploring numerosity based haptic and audio PIN entry,” Interact.Comput., vol. 24, no. 5, pp. 409–422, 2012.
- M. G. Kuhn. (1997). Probability Theory for Pickpockets, ee-PIN Guessing [Online]. Available: http://www.cl.cam.ac.uk/~mgk25/
- D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical password schemes,” in Proc. 13th Conf. USENIX Security Symp., 2004,pp. 151–164.
- J. Bonneau, S. Preibusch, and R. Anderson, “A birthday present every eleven wallets? The security of customer-chosen banking PINs,” in Financial Cryptography (LNCS), New York, NY, USA: Springer-Verlag,2012, pp. 25–40.
- Q. Yan, J. Han, Y. Li, and R. H. Deng, “On limitations of designing leakage-resilient password systems: Attacks, principles and usability,” in Proc. NDSS, 2012, pp. 50–58.
- R. Kuber and W. Yu, “Tactile vs graphical authentication,” in EuroHaptics (LNCS). New York, NY, USA: Springer-Verlag, 2010, pp. 314–319.
- H. Sasamoto, N. Christin, and E. Hayashi, “Undercover: Authentication usable in front of prying eyes,” in Proc. CHI, 2008, pp. 183–192.
- A. D. Luca, E. von Zezschwitz, and H. Hußmann, “Vibrapass: Secure authentication based on shared lies,” in Proc. CHI, 2009, pp. 913–916.
- A. Bianchi, I. Oakley, J. K. Lee, and D.-S. Kwon, “The haptic wheel:Design & evaluation of a tactile password system,” in Proc. CHI, 2010,pp. 3625–3630.
- A. Bianchi, I. Oakley, and D.-S. Kwon, “The secure haptic keypad:A tactile password system,” in Proc. CHI, 2010, pp. 1089–1092.
- A. Bianchi, I. Oakley, and D.-S. Kwon,“Spinlock: A single-cue haptic and audio PIN input technique for authentication,” in HAID (LNCS).New York, NY, USA: Springer-Verlag, 2011, pp. 81–90.
- A. Bianchi, I. Oakley, and D.-S. Kwon, “Open sesame: Design guidelines for invisible passwords,” IEEE Comput., vol. 45, no. 4, pp. 58–65,Apr. 2012.
- M. Bell and V. Lovich, “Apparatus and methods for enforcement of policies upon a wireless device,” U.S. Patent 8 254 902, Aug. 12, 2012.
- (2013). Photographing Sound of Mobile Phone Camera [Online]. Available: http://www.tta.or.kr/data/ttas_view.jsp?rn=1&pk_num=TTAK.KO-06.0063/R1
- G. A. Alvarez and P. Cavanagh, “The capacity of visual short-term memory is set both by visual information load and by number of objects,” Psychol. Sci., vol. 15, no. 2, pp. 106–111, 2004.
- G. A. Miller, “The magical number seven, plus or minus two: Some limits on our capacity for processing information,” Psychol. Rev., vol. 63,no. 2, pp. 81–97, 1956.
- T. Kwon, S. Shin, and S. Na, “Covert attentional shoulder surfing: Human adversaries are more powerful than expected,” IEEE Trans. Syst.,Man, Cybern., Syst., pp. 1–12, to be published.
- T. Perkovi´c, M. Cagalj, ˘ and N. Raki´c, “SSSL: Shoulder surfing safe login,” in Proc. Int. Conf. Softw., Telecommun. Comput. Netw., 2009, pp. 270–275.
- A. De Luca, E. von Zezschwitz, N. D. H. Nguyen, M.-E. Maurer, E. Rubegni, M. P. Scipioni, et al., “Back-of-device authentication on smartphones,” in Proc. CHI, 2013, pp. 2389–2398.
- Q. Yan, J. Han, Y. Li, J. Zhou, and R. H. Deng, “Designing leakageresilient password entry on touchscreen mobile devices,” in Proc. ASIACCS, 2013, pp. 37–48.
- K. Kobara and H. Imai, “Limiting the visible space visual secret sharing schemes and their application to human identification,” in ASIACRYPT (LNCS), 1996, pp. 185–195.
- A. D. Luca, E. von Zezschwitz, L. Pichler, and H. Hussmann, “Using fake cursors to secure on-screen password entry,” in Proc. CHI, 2013,pp. 2399–2402.
- D. S. Tan, P. Keyani, and M. Czerwinski, “Spy-resistant keyboard: More secure password entry on public touch screen displays,” in Proc. 17th Austral. Conf. Comput. Human Interaction OZCHI, 2005, pp. 1–10.
- R. Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, article 19, pp. 1–41, 2012.
- W. Moncur and G. Leplâtre, “Pictures at the ATM: Exploring the usability of multiple graphical passwords,” in Proc. CHI, 2007,pp. 887–894.
- D. Weinshall, “Cognitive authentication schemes safe against spyware (short paper),” in Proc. IEEE Symp. Security Privacy, May 2006,pp. 295–300.
- S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, “Design and evaluation of a shoulder-surfing resistant graphical password scheme,” in Proc. AVI, 2006, pp. 177–184.
- H. Zhao and X. Li, “S3PAS: A scalable shoulder-surfing resistant textual-graphical password authentication scheme,” in Proc. AINA Workshops, 2007, pp. 467–472.
- P. Golle and D. Wagner, “Cryptanalysis of a cognitive authentication scheme (extended abstract),” in Proc. IEEE Symp. Security Privacy,May 2007, pp. 66–70.
- A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens,” in Proc. 4th USENIX Conf.Offensive Technol. WOOT, 2010, article 1–7, pp. 1–10.
- E. von Zezschwitz, A. Koslow, A. D. Luca, and H. Hussmann, “Making graphic-based authentication secure against smudge attacks,” in Proc.IUI, 2013, pp. 277–286.
- (2013). iPhone 5s: About Touch ID Security [Online]. Available:http://support.apple.com/kb/HT5949
- (2013). iPhone 5S Fingerprint Sensor Hacked by Germany’s Chaos Computer Club [Online]. Available: http://www.theguardian.com/technology/2013/sep/22/apple-iphone-fingerprint-scanner-hacked
- T. Kwon and S. Shin. (2011) HAM: A Study of Human Adversary Modeling via Predictive Human Performance Modeling Tools [Online].Available: http://islab.yonsei.ac.kr/index.php?mid=publication
- D. Amitay. (2011). Most Common iPhone Passcodes [Online].Available: http://danielamitay.com/blog/2011/6/13/most-commoniphone-passcodes The reference is Mr.T.mani(Assistant professor \ECE).