Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

USB based Dynamic Authentication Alert System for Computers

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 6
Year of Publication: 2014
Authors:
Chandra J.
Shreya Nag
10.5120/18755-0014

Chandra J. and Shreya Nag. Article: USB based Dynamic Authentication Alert System for Computers. International Journal of Computer Applications 107(6):17-20, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Chandra J. and Shreya Nag},
	title = {Article: USB based Dynamic Authentication Alert System for Computers},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {6},
	pages = {17-20},
	month = {December},
	note = {Full text available}
}

Abstract

In the present work, an innovative mechanism to convert a USB drive into a key has been introduced. A unique key file is written on to the drive which acts as the authentication mechanism to access the user's computer. This device can be used to lock or unlock the system by simply removing or attaching it. The current session is not hampered even though the system is secure and cannot be accessed without the specific USB drive. To further improve security, the key file contents are rewritten after a set time interval, to preserve the security even if the drive is lost. In absence of the USB drive, the user can gain access by entering the master password. A particular system might have more than one USB keys as well, and a key can be used to access multiple systems. This mechanism was then coded into a deliverable software which implemented all the security features including possible intrusion detections and alerts. The advantage of this mechanism is that it is a faster and efficient way to temporarily pause the current session of a system without having to log out. It is most suitable for workplace workstations as well as for desktops, personal computers and laptops. There is, however, scope to improve the current method add incorporate more features.

References

  • Zhihui Liu, Gu, L. , Yixian Yang and Guoqiang Xing "An identity authentication scheme based on USB Key for Trusted Network Connect", Information Theory and Information Security (ICITIS), pp. 203 – 207, 2010
  • Yu Jin-wei "The program design for the network security authentication based on the USB Key technology", Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on, On Vol. 5, page(s): 2215 – 2218
  • Tao Yizheng, Tang Dingyong, Gaoshan, Shenhao "Design and Implementation of USB Key-Based JavaEE Dual-Factor Authentication System", Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on, On Vol. 4, page(s): 443 – 446
  • Jiang Yu, Chuan-fu Zhang "Design and Analysis of a USB-Key Based Strong Password Authentication Scheme", Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, On page(s): 1 - 4
  • Zhu Juan-hua, Wu Ang, Guo Kai "PC lock software design based on removable storage device and dynamic password", Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, On Vol. 3, page(s): V3-326 - V3-329
  • Leslie Lamport. Password Authentication with Insecure Communication [J]. Communications of the ACM, 1981, 24(11): 770-772
  • A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Transactions on Fundamentals 1990. On Vol. J73-D-I, No. 7, page(s): 630 – 636
  • Shreya Nag, Dr. Meenakumari J, Sayantan Chakraborty "Design and Analysis of EyeSeeYou: Computer Surveillance Software", International Journal of Research in Information Technology, On Vol. 1, Issue 6, page(s): 52 - 59
  • QIN Zhi-guang, "Cryptography algorithm-survey and trends", Journal of Computer Application, On Vol. 24, No. 2, page(s): 1 - 4
  • Dino Esposito, Microsoft® . NET: Architecting Applications for the Enterprise (Pro-Developer), Microsoft Press, 2008.
  • Alex Mackey. Introducing . NET 4. 0: with Visual Studio 2010, Apress, 2010.