Open Access   Article Go Back

Illusion Pin: Authentication Using Zero Knowledge Protocol

Soubhagyalaxmi V Nerabenchi1 , Sanjana B2 , Shaik Ajith3 , Siddalinga Navadagi4

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 471-473, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.471473

Online published on May 15, 2019

Copyright © Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi, “Illusion Pin: Authentication Using Zero Knowledge Protocol,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.471-473, 2019.

MLA Style Citation: Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi "Illusion Pin: Authentication Using Zero Knowledge Protocol." International Journal of Computer Sciences and Engineering 07.14 (2019): 471-473.

APA Style Citation: Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi, (2019). Illusion Pin: Authentication Using Zero Knowledge Protocol. International Journal of Computer Sciences and Engineering, 07(14), 471-473.

BibTex Style Citation:
@article{Nerabenchi_2019,
author = {Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi},
title = {Illusion Pin: Authentication Using Zero Knowledge Protocol},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {471-473},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1177},
doi = {https://doi.org/10.26438/ijcse/v7i14.471473}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.471473}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1177
TI - Illusion Pin: Authentication Using Zero Knowledge Protocol
T2 - International Journal of Computer Sciences and Engineering
AU - Soubhagyalaxmi V Nerabenchi, Sanjana B, Shaik Ajith, Siddalinga Navadagi
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 471-473
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

we have used Illusion PIN(IPIN) to solve the problems regarding shoulder_surfing attacks on authentication schemes.PIN -based authentication are practically used on touch screen devices. PIN works on the principle technique of hybrid images.The hybrid images are been merged to keypads. These keypads are ordered to different digits.Thus,making the user to see the device and enter the password whereas the attacker would see another password as the attacker is not as close as the user.The keypads are been shuffled to avoid further attacks,if the attacker is able to remember the position of the keypads.To increase the reliability and security of illusion pin,we worked on algorithm based on human visual perception and calculatimg the minimum distance from attacker and the user.We evaluated our calculations with 84 simulated shoulder-surfing attacks that were obtained from 21 different people.All of the 84 attacks were unsuccessful and we evaluated the minimum distance that a camera cannot capture the necessary data from use’s keypad.. According to our analysis,surveillance camera were not able to capture the PIN of a touchscreen user when Illusion PIN is used.

Key-Words / Index Term

PIN, touch creen devices, Analysis surveillance

References

[1] Stajano, “The quest to replace passwords: was written by J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano,
[2] M. Harbach, A. De Luca, and S. Egelman, “The anatomy of smartphone unlocking,”
[3] J. Bonneau, S. Preibusch, and R. Anderson, “A birthday present every eleven wallets? the security of customer-chosen banking pins.”
[4] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge attacks on smartphone touch screens.”
[5] A. Oliva, A. Torralba, and P. G. Schyns, “Hybrid images,” ACM Transactions on Graphics (TOG)
[6] D. Kim, P. Dunphy, P. Briggs, J. Hook, J. W. Nicholson, J. Nicholson, and P. Olivier, “Multi-touch authentication on tabletops.”
[7] L.-W. Chan, T.-T. Hu, J.-Y. Lin, Y.-P. Hung, and J. Hsu, “On top of tabletop: A virtual touch panel display,”
[8] W. Matusik, C. Forlines, and H. Pfister, “Multiview user interfaces with an automultiscopic display,”
[9] C. Harrison and S. E. Hudson, “A new angle on cheap lcds: making positive use of optical distortion,”
[10] S. Kim, X. Cao, H. Zhang, and D. Tan, “Enabling concurrent dual views on common lcd screens,”
[11] E. Hayashi, R. Dhamija, N. Christin, and A. Perrig, “Use your illusion: secure authentication usable anywhere,”
[12] I. Jermyn, A. J. Mayer, F. Monrose, M. K. Reiter, A. D. Rubin et al., “The design and analysis of graphical passwords.”
[13] N. H. Zakaria, D. Griffiths, S. Brostoff, and J. Yan, “Shoulder surfing defence for recall-based graphical passwords,”
[14] D. S. Tan, P. Keyani, and M. Czerwinski, “Spy-resistant keyboard: Towards more secure password entry on publicly observable touch screens,”
[15] V. Roth, K. Richter, and R. Freidinger, “A pin-entry method resilient against shoulder surfing,”