AN Efficiently Detect and Filter False Data Injected Using Quantum Cryptography in Wireless Sensor Networks

International Journal of Communication and Media Science
© 2015 by SSRG - IJCMS Journal
Volume 2 Issue 2
Year of Publication : 2015
Authors : B.Pratheepa and M.Praveen Umar
pdf
How to Cite?

B.Pratheepa and M.Praveen Umar, "AN Efficiently Detect and Filter False Data Injected Using Quantum Cryptography in Wireless Sensor Networks," SSRG International Journal of Communication and Media Science, vol. 2,  no. 2, pp. 1-4, 2015. Crossref, https://doi.org/10.14445/2349641X/IJCMS-V2I2P105

Abstract:

Security is the key term which revolves around every user’s Confidentiality and Privacy on web. It is mainly achieved through passwords and conventional login systems.The literature survey clearly shows that the existing systems results in severe issues due to poor remembrance, reusability, weak passwords, hacking. This turns out to be a great problem for users having number of accounts either using same or distinct passwords for each. Considering the current mechanisms, authenticating users via passwords is not a comprehensive solution.In this paper, we design a human verifiable authentication protocol named Duoswhich combines user’s handheld device and message service to thwart password stealing or reuse. The goal of this protocol is to prevent users from typing their memorized passwords into kiosks.. Users only need to remember a Long-Term Password (LTPWD) for login on all websites. We believe this to be efficient and affordable compared with the conventional web authentication mechanisms

Keywords:

Domino Effect, Human verifiable, Long Term Password, Password Stealing attacks.

References:

[1] Chien-Ming Chen, King-Hang Wang, Tsu-Yang Wu, Jeng-Shyang Pan, and Hung-Min Sun”A Scalable Transitive Human Verifiable Human Authentication Protocol For Mobile Devices” in IEEE Transactions On Information Forensics And Security, VOL. 8, NO. 8,     AUGUST 2013.
[2] Dinei Florencio and Cormac Herley “A Large-Scale Study of Web Password Habits” in Proc. WWW 2007, Banff, BC.
[3] Shirley Gaw, Edward W.Felten “Password Management Strategies for Online Accounts” in Symposium On Usable Privacy  and Security (SOUPS) 2006, July 12-14, 2006.
[4] P.C. van Oorschot, Amirali Salehi-Abari, Julie Thorpe “Purely Automated Attacks on PassPoints-Style Graphical Passwords” in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010.
[5] Scott Garriss, Ramón Cáceres ,Stefan BergerReiner Sailer , Leendert an Doorn, Xiaolan Zhang “Trustworthy and Personalized Computing on Public Kiosks” in MobiSys’08, June 17-20, 2008.
[6] Scott Garriss Ram, Stefan Berger,Reiner Sailer, Leendert van Doorn, Xiaolan Zhang,Carnegie Mellon  AMD,Pittsburgh, Austin. “Towards Trust Worthy Kiosk Computing” in Eighth IEEE Workshop on Mobile Computing Systems and Applications
[7] Min Wu, Simson Garfinkel ,Rob Miller “Secure Web Authentication with Mobile Phones” inMIT Computer Science and Artificial Intelligence Laboratory, 200 Technology Square, Cambridge MA, 02139 USA.
[8] Nisarg Gandhewar, Rahila Sheikh “Google Android: An Emerging Software Platform For Mobile Devices” in International Journal on Computer Science and Engineering.
[9] Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K.Reiter, Aviel D.Rubin”The Design and Analysis Of Graphical Passwords” inProceedings of the 8th USENIX Security Symposium.
[10] Sonia Chiasson, Alain Forget, Elizabeth Stobert “Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords” in ACM CCS’09 November 9–13, 2009.
[11] Steven M. Bellovin and Michael Merritt “Encrypted Key Exchange:Password-Based Protocols Secure Against Dictionary Attacks” in 1992 IEEE
[12] David P. Jablon “Extended Password Key Exchange ProtocolsImmune to Dictionary Attack” in 1997 IEEE
[13] D.Amaravathi,P.Swathi“Secure Authentication Scheme in Wireless Networks“ in IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
[14] WelderufaelBerhaneTesfay, Todd Booth, and Karl Andersson “Reputation Based Security Model for Android Applications” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Xiao Ling-Zi, ZHANG Yi-Chun”A Case Study of Text-Based CAPTCHA Attacks” in 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover