authentication technique
Recently Published Documents


TOTAL DOCUMENTS

212
(FIVE YEARS 54)

H-INDEX

12
(FIVE YEARS 3)

2021 ◽  
pp. 535-542
Author(s):  
Nader Abdel Karim ◽  
Hasan Kanaker ◽  
Shadi Almasadeh ◽  
Jamal Zarqou

User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.


2021 ◽  
Author(s):  
B. Srivani ◽  
S. Renu Deepti ◽  
Qualid Unnisa

Software defined networking (SDN) permits community feature program ability intended to facilitate about design along with renovation, as well as permit community directors toward adapt congestion guidelines. Nevertheless, denial of provider (DoS) assailants causes productivity issues upon centralized consolidate aircraft about SDN. Even through shipping layer safety (TLS) be able to assist comfy manage plane, that far analytically extensive and composite design. Within the document, we plan light-weight validate compound, known as Hidden Authentication (HiAuth), toward guard the SDN through battering specifications about redirecting devices to control packets thru effective bitwise functioning. HiAuth be that initially toward incorporate records battering methods for Open Flow toward offer safety in opposition to DoS attacks. HiAuth utilizes IP identification field about IPv4 as well as proceedings recognition area about OpenFlow within two attestation methods. The investigational outcomes display that HiAuth able to efficiently alleviate trespasser DoS assaults as well as supply excessive unnoticeable toward assailants.


Author(s):  
Nafisah Kheshaifaty ◽  
◽  
Adnan Gutub ◽  

Password alone is currently not trusted for user online authentication and security as threats from hackers continue to grow, requiring highly efficient defense safeguard protection against unauthorized users. Therefore, CAPTCHA techniques came into the picture as an automated assistance to distinguish between humans and robots. The CAPTCHA has several applications in the online security domain requiring to be merged with encrypted hash function benefitting from the facility of the graphical password schemes. This paper proposes engineering an authentication technique using graphical CAPTCHA with an AES encrypted hash password to maintain applicable security accessing systems. We propose three layered security system that joins highly efficient security mechanisms to avoid users’ stress of entering password many times or different other hectic routines in order to save account accessing.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Suliman A. Alsuhibany ◽  
Afnan S. Almuqbil

The keystroke dynamic authentication (KDA) technique was proposed in the literature to develop a more effective authentication technique than traditional methods. KDA analyzes the rhythmic typing of the owner on a keypad or keyboard as a source of verification. In this study, we extend the findings of the system by analyzing the existing literature and validating its effectiveness in Arabic. In particular, we examined the effectiveness of the KDA system in Arabic for touchscreen-based digital devices using two KDA classes: fixed and free text. To this end, a KDA system was developed and applied to a selected device operating on the Android platform, and various classification methods were used to assess the similarity between log-in and enrolment sessions. The developed system was experimentally evaluated. The results showed that using Arabic KDA on touchscreen devices is possible and can enhance security. It attains a higher accuracy with average equal error rates of 0.0% and 0.08% by using the free text and fixed text classes, respectively, implying that free text is more secure than fixed text.


Sign in / Sign up

Export Citation Format

Share Document