By Topic

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

10 Author(s)
Chauhan, D.S. ; Dept. of CSE & IT, HCL Technol., Noida ; Sehgal, V.K. ; Mahanot, A. ; Singh, P.
more authors

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. IBA encapsulates Kerberos Protocol, Version 5, and provides clients a completely unique and secured authentication tool to work on. This paper is a comprehensive study on the subject of using images as the password set and the implementation of Jaypee University of Information Technology (JUIT) IBA system called as JUIT-IBA. This tool provides a secure channel of communication between the communicating entities. The assortment of image set as client's password aims at thwarting Brute Force attacks, Shoulder attack, and Tempest attack at the client side while the attacks at the server side can be averted by putting into practice Kerberos protocol. It also describes how our system works along with the evaluation of its performances in different computing environments.

Published in:

Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference on

Date of Conference:

14-16 May 2008