BLAPD: Biometric Liveness Authentication on Personalized Devices

Author
Kavya R
Keywords
Static Password; Username; One-Time Password; Iris image
Abstract
The static password is as yet a foundation for confirmation of numerous sites, application and so on, it is the most prominent and the least secure validation technique. At the point when the aggressor gets the secret word of the client, he can utilize it inside its lifetime. At that point, the assailant can mimic the client for a boundless time. So this structure makes all-out security. On the off chance that one sign into a session, the username can be set as a live iris image. This can’t break security and will be secure, likewise less tedious. In the event that there happen a circumstance that some other client expected to sign in, at that point can set the settings, to give username is the dynamic username. This gives access to control consent. On account of the password, an one-time password is sent to the gadget and will naturally bring from gadget to sign in. This case gives legitimacy time and access control authorization. The plan is to make a one of a kind username and secret key set for every session with the end goal that different security vulnerability in traditional, live iris image username and OTP password frameworks can be handled.
References
[1] Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, (2017) ‘‘An attribute based encryption scheme to secure fog communications,’’ IEEE Access, vol. 5, pp. 9131–9138, doi: 10.1109/ ACCESS.2017.2705076.
[2] Federal Financial Institutions Examination Council, (2005)‘‘Authentication in an internet banking environment,’’ Federal Deposit Insurance Corp.(FDIC), Washington, DC, USA, Tech. Rep. FIL-103-2005, Mar.
[3] X. Fang and J. Zhan(2010) ‘‘Online banking authentication using mobile phones,’’ in Proc. 5th Int. Conf. Future Inf. Technol. (FutureTech),.
[4] https://haveibeenpwned.com/2016
[5] M. Mannanand, P.Van Oorschot, (2012) ‘‘Passwords for both mobile and desktop computers: OBPWD for firefox and Android,’’ USENIX; Login, vol. 37, no. 4, pp. 28–37,.
[6] A. Das, J. Bonneau, M. Caesar, N. Borisov, and X. Wang, (2014) ‘‘The tangled web of password reuse,’’in Proc.Symp.Netw.Distrib.Syst.Secur.(NDSS.
[7] Raghavendra, C., Kumaravel, A., & Sivasubramanian, S,(2017) “Iris technology: A review on iris based biometric systems for unique human identification”, International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)..
[8] Williams, G. O, (2016) “Iris recognition technology”, IEEE Aerospace and Electronic Systems Magazine.
[9] Gil Santos and Edmundo Hoyle,(2012) “A fusion approach to unconstrained iris recognition”, Pattern Recognition Letters, 33 (1), p984- 990.
[10] Y. Li, H. Wang, and K. Sun, (2016)“A study of personal information in human chosen passwords and its security implications”.
[11] Z. Li, W. Han, and W. Xu, (2014) “A large-scale empirical analysis of Chinese web passwords”, In USENIX Security.
[12] R. Veras, C. Collins, and J. Thorpe, (2014) “ On the semantic patterns of passwords and their security impact In NDSS”.
[13] L. Wang, Y. Li, and K. Sun. Amnesia,( 2016)“A bilateral generative password manager”, in ICDCS..
[14] P. Cao, H. Li, K. Nahrstedt, Z. Kalbarczyk, R. Iyer, and A. J. Slagell, “ (2014) Personalized password guessing: a new security threat”, in ACM Proceedings of the 2014 Symposium and Bootcamp on the Science of Security.
[15] S. Komanduri, R. Shay, L. F. Cranor, C. Herley, and S. Schechter, “Telepath words (2014).Preventing weak passwords by reading users minds”, in USENIX Security

Received : 07 February 2020  

?Accepted : 21 May 2020

Published : 04 June 2020  

DOI: 10.30726/ijlca/v7.i2.2020.72003

BLAPD: Biometric Liveness Authentication on Personalized Devices