Securing ATM Using Graphical Password Authentication Scheme

  IJCTT-book-cover
 
International Journal of ComputerTrends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-8 Number-3                          
Year of Publication : 2014
Authors : Sonia Rathi , Raunak Chitnis , Ramakant Yadav , Mrs. M.V.Bhosle
DOI :  10.14445/22312803/IJCTT-V8P125

MLA

Sonia Rathi , Raunak Chitnis , Ramakant Yadav , Mrs. M.V.Bhosle. "Securing ATM Using Graphical Password Authentication Scheme". International Journal of Computer Trends and Technology (IJCTT) V8(3):133-137, February 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In our day to day life ATMs are widely used and have brought so much relief to the financial world. Various problems were solved with the advent of these machines ranging from keeping the banking hall free of traffic with its attendant issues. But crime at ATMs has become a nationwide issue that faces not only customers, but also for bankers and this financial crime case rises repeatedly in recent years. To handle this issue, one solution can be the use of graphical password to overcome the problem of textual password. In this paper, we present and evaluate our contribution, i.e., the iChess password. The iChess password is a multifactor authentication scheme. We present an iChess Chess board virtual environment where the user navigates and interacts with various objects. The series of actions and interactions toward the objects inside the iChess environment constructs the user’s iChess password. The design of the iChess virtual environment and the type of objects selected determine the iChess password key space. Further for more security we are providing a random four digit number (flash code) on the respective users mobile which is new for every login.

References
[1] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik, Three-Dimensional Password for More Secure Authentication, School of Information Technology and Engineering, University of Ottawa, VOL. 57, NO. 9, SEPTEMBER 2008
[2] Chippy. T and R.Nagendran, Defences Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points, International Journal of Communications and Engineering, Volume 03– No.3, Issue: 01 March2012
[3] Sonia Chiasson, Alain Forget, Elizabeth Stobert, P.C. van Oorschot, Robert Biddle, Multiple Password Interference in Text Passwords and Click-Based Graphical Passwords, School of Computer Science, Department of Psychology Carleton University, Ottawa, Canada, ACM CCS’09, November 9–13, 2009
[4] Robert Biddle, Sonia Chiasson, and P.C. van Oorschot, Graphical Passwords: Learning from the First Twelve Years, Carleton University, Ottawa, Canada, ACM, September 27, 2010
[5] Amirali Salehi-Abari, Julie Thorpe, and P.C. van Oorschot, On Purely Automated Attacks and Click-Based Graphical Passwords, Annual Computer Security Applications Conference, IEEE, Version: Sept.15, 2008
[6] Sonia Chiasson, Robert Biddle, P.C. van Oorschot, A Second Look at the Usability of Click-Based Graphical Passwords, Symposium On Usable Privacy and Security (SOUPS) 2007, July 18- 20, 2007, Pittsburgh, PA, USA. Volume 2, Issue 9, September 2013
[7] Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul van Oorschot, Robert Biddle, Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords, ACSAC ’10 Austin, Texas USA Copyright 2010 Dec. 6-10, 2010, ACM 978-1-4503-0133-6/10/12
[8] Sonia Chiasson, Elizabeth Stobert, Alain Forget, Robert Biddle, and Paul C. van Oorschot, Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism, IEEE, VOL. 9, NO. 2, MARCH/APRIL 2012
[9] Susan Wiedenbecka, Jim Watersa, Jean-Camille Birgetb, Alex Brodskiyc, Nasir Memonc, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human-Computer Studies 63 (2005) 102–127
[10] Aman Darren Davis Fabian Monrose Michael K. Reiter, On User Choice in Graphical Password Schemes, Usenix, The Advanced Computing Systems Association, Volume 13 pages 11-11 27 July 2004

Keywords
Authentication, Graphical password, Usability security, Flash code