SlideShare a Scribd company logo
1 of 34
PRESENTED TO:-
MR.VIJAY SEHGAL
(PROFESSOR)
S.C.D.GOVT.COLLEGE.LD
H
PRESENTED BY:-
VIVEK GUPTA
B.C.A.III
2916
 Authentication & their types.
 Knowledge Based Authentication.
 Token Based Authentication.
 Biometrics Authentication.
 Drawbacks.
 3D Password.
 3D Virtual Environment.
 Advantages & Application.
 Attacks & Countermeasures.
 Conclusion.
Areas Of Discussion
Authentication
Authentication is a process of validating who you are to
whom you claimed to be or a process of identifying an
individual, usually based on a username and password.
 Human authentication techniques are as follows:
1. Knowledge Based (What you know)
2. Token Based (What you have)
3. Biometrics (What you are)
Three Basic Identification
Methods of password
Possession
(“something I have”)
•Keys
•Passport
•Smart Card
Knowledge
(“Something I know”)
•Password
• Pin
Biometrics
(“something I am”)
•Face
•Fingerprints
•Iris
Password
• Password is basically an encryption
algorithms.
 It is 8-15 character or slightly more than that.
 Mostly textual passwords nowadays are
kept which are very simple.
T
O
K
E
N
B
A
S
E
D
A security token (or sometimes a hardware
token, authentication token, software token) may be a
physical device that an authorized user of computer
services is given to ease authentication.
B
I
O
M
E
T
R
I
C
S
Biometrics
•Refer to a broad range of
technologies.
•Automate the identification
or verification of an individual.
•How secure is your password?
Now with the technology change,
fast processors and many tools on
the Internet, cracking password has
become a Child's Play.
Approximately, Ten years back
Klein performed such tests and he
could crack 10-15 passwords per
day.
PASSWORD
Token
 Involves additional costs, such as the cost of the token and
any replacement fees.
 Users always need to carry the token with them.
 Users need multiple tokens for multiple Web sites and
devices.
 Does not protect fully from man-in-the-middle attacks (i.e.,
attacks where an intruder intercepts a user's session and steals
the user's credentials by acting as a proxy between the user and
the authentication device without the user's knowledge).
BIOMETRICS
•Biometrics has also some
drawbacks.
Suppose you select your fingerprint
as a biometrics..
But what to do when you have crack
or wound in your finger.
And now a days some hackers even
implement exact copy of your
biometrics also….
•The 3D passwords are more customizable, and
very interesting way of authentication.
•A 3D password is a multifactor
authentication scheme that
combine
RECOGNITION
+RECALL
+TOKENS
+BIOMETRICS
in one authentication system.
 The 3D password presents a virtual environment
containing various virtual objects.
 The user walks through the environment and interacts
with the objects.
 It is the combination and sequence of user interactions
that occur in the 3D environment.
 It becomes much more difficult for the attacker to
guess the user’s 3-D password.
Virtual objects
 Virtual objects can be any object we encounter in real life:
A computer on which the user can type in.
A fingerprint reader that requires users fingerprint.
A paper or white board on which user can type.
An Automated teller(ATM) machine that requires a token.
A light that can be switched on/off.
A television or radio where channels can be selected.
A car that can be driven.
A graphical password scheme.
A biometric recognition device.
A staple that can be punched.
A book that can be moved from one place to another.
Snapshot of a proof - of - concept virtual
art gallery
System Implimentation
The 3D password is a multi factor authentication scheme. The 3D password
presents a 3D virtual environment containing various virtual objects. The user
navigates through this environment and interacts with the objects. The 3D
password is simply the combination and the sequence of user interactions that
occur in the 3D virtual environment. The 3D password can combine
recognition, recall, token, and biometrics based systems into one
authentication scheme. This can be done by designing a 3D virtual
environment that contains objects that request information to be recalled,
information to be recognized, tokens to be presented, and biometric data to be
verified.
For example, the user can enter the virtual environment and type something on
a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a
fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and
provide his/her fingerprint. Then, the user can go to the virtual garage, open
the car door, and turn on the radio to a specific channel. The combination and
the sequence of the previous actions toward the specific objects construct the
user’s 3D password.
STATE DIAGRAM OF A 3D PASSWORD APPLICATION
Example
consider a user who navigates through the 3D virtual environment that consists of an
office and a meeting room. Let us assume that the user is in the virtual office and the
user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes
the door. The user then finds a computer to the left, which exists in the position (4, 34,
18), and the user types “CAT”. The user then walks over turns on the light located in
(50,6,20) and then goes to a white board located in (55,3,30) and draws just one dot in
the (x , y) coordinate of the white board at the specific point of (420,170). The initial
representation of user actions in the 3D virtual environment can be recorded as
follows::
*(10, 24, 91) Action = Open the office door;
*(10, 24, 91) Action = Close the office door;
*(4, 34, 18) Action = Typing, “C”;
*(4, 34, 18) Action = Typing, “A”;
*(4, 34, 18) Action = Typing, “T”;
*(50, 6, 20)Action = Turning the light on;
*(55, 3, 30)Action = Goes to white board;
*(55, 3, 30)Action = Draws point = (420,170);
3D VIRTUAL
ENVIRONMENT
3D Virtual Environment
•3-D virtual environment affects the usability, effectiveness, and
acceptability of a 3-D password system.
•We can use any real time object as a environment like any room or
village but for simplicity we suggest to use small environment like
room.
3D Virtual Environment
The design of 3D virtual environments should follow
these guidelines:
 Real Life Similarity
 Object Uniqueness & Distinction
 3D Virtual Environment Size
 Number of objects & their types
Advantages
 Flexibility:3D Passwords allows Multifactor
authentication biometric, textual passwords can be
embedded in 3D password technology.
 Strength: This scenario provides almost unlimited
passwords possibility.
 Ease to Memorize: Can be remembered in the form of
short story.
 Respect of Privacy: Organizers can select authentication
schemes that respect users privacy.
Applications
The 3D password’s main application domains are protecting
critical systems and resources.
 Critical Servers
 Nuclear Reactors & Military Facilities
 Airplanes and Missile Guiding
Attacks and Countermeasures
Brute Force Attack
Well studied Attack
 Shoulder-surfing Attack
Brute Force Attack
The attacker has to try all possible 3D passwords.
This kind of attack is very difficult for the following
reasons.
 Time required to login .
 3D Attacks are very expensive.
Well Studied Attack
The attacker tries to find the highest probable distribution of
3D passwords. In order to launch such an attack, the attacker
has to acquire knowledge of the most probable 3D password
distributions. This is very difficult because the attacker has to
study all the existing authentication schemes that are used in
the 3D environment.
Moreover, a well studied attack is very hard to accomplish
since the attacker has to perform a customized attack for every
different 3D virtual environment design.
Shoulder-surfing Attack
An attacker uses a camera to record the user’s 3D password or
tries to watch the legitimate user while the 3D password is
being performed. This attack is the most successful type of
attack against 3D passwords and some other graphical
passwords. However, the user’s 3D password may contain
biometric data or textual passwords that cannot be seen from
behind. Therefore, we assume that the 3D password should be
performed in a secure place where a shoulder surfing attack
cannot be performed.
 The authentication can be improved with 3D password,
because the unauthorized person may not interact with same
object at a particular location as the legitimate user.
 It is difficult to crack, because it has no fixed number of
steps and a particular procedure.
 Added with biometrics and token verification this schema
becomes almost unbreakable.
Conclusion
Vivek

More Related Content

What's hot (20)

Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3dpassword
3dpassword3dpassword
3dpassword
 
3D Password
3D Password3D Password
3D Password
 
3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication3D-Password: A More Secure Authentication
3D-Password: A More Secure Authentication
 
3 d password
3 d password3 d password
3 d password
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
3D Password
3D Password3D Password
3D Password
 
3d password
3d password3d password
3d password
 
3D password
3D password3D password
3D password
 
3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
Kanishka_3D Passwords
Kanishka_3D PasswordsKanishka_3D Passwords
Kanishka_3D Passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3d passwords
3d passwords3d passwords
3d passwords
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 

Similar to Vivek

Similar to Vivek (20)

3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d pass words
3d pass words3d pass words
3d pass words
 
3 d password
3 d password3 d password
3 d password
 
3dpassword by janapriya
3dpassword by janapriya3dpassword by janapriya
3dpassword by janapriya
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Passwrd
3D Passwrd3D Passwrd
3D Passwrd
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
C0361419
C0361419C0361419
C0361419
 
Graphical authintication
Graphical authinticationGraphical authintication
Graphical authintication
 
A Novel Revolutionary highly secured Object authentication schema
A Novel Revolutionary highly secured Object authentication  schemaA Novel Revolutionary highly secured Object authentication  schema
A Novel Revolutionary highly secured Object authentication schema
 
New era of authentication
New era of authenticationNew era of authentication
New era of authentication
 
3dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp023dpassword ppt-120815070434-phpapp02
3dpassword ppt-120815070434-phpapp02
 
3D - password
3D - password3D - password
3D - password
 
Deepak 3 dpassword (2)
Deepak 3 dpassword (2)Deepak 3 dpassword (2)
Deepak 3 dpassword (2)
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
3dpasswordppt
3dpasswordppt3dpasswordppt
3dpasswordppt
 
3d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp023d pswdbysuresh-120112091037-phpapp02
3d pswdbysuresh-120112091037-phpapp02
 
3d passwords
3d passwords 3d passwords
3d passwords
 

Recently uploaded

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 

Recently uploaded (20)

Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 

Vivek

  • 2.  Authentication & their types.  Knowledge Based Authentication.  Token Based Authentication.  Biometrics Authentication.  Drawbacks.  3D Password.  3D Virtual Environment.  Advantages & Application.  Attacks & Countermeasures.  Conclusion. Areas Of Discussion
  • 3. Authentication Authentication is a process of validating who you are to whom you claimed to be or a process of identifying an individual, usually based on a username and password.  Human authentication techniques are as follows: 1. Knowledge Based (What you know) 2. Token Based (What you have) 3. Biometrics (What you are)
  • 4. Three Basic Identification Methods of password Possession (“something I have”) •Keys •Passport •Smart Card Knowledge (“Something I know”) •Password • Pin Biometrics (“something I am”) •Face •Fingerprints •Iris
  • 5.
  • 6. Password • Password is basically an encryption algorithms.  It is 8-15 character or slightly more than that.  Mostly textual passwords nowadays are kept which are very simple.
  • 8. A security token (or sometimes a hardware token, authentication token, software token) may be a physical device that an authorized user of computer services is given to ease authentication.
  • 10. Biometrics •Refer to a broad range of technologies. •Automate the identification or verification of an individual.
  • 11.
  • 12. •How secure is your password? Now with the technology change, fast processors and many tools on the Internet, cracking password has become a Child's Play. Approximately, Ten years back Klein performed such tests and he could crack 10-15 passwords per day. PASSWORD
  • 13. Token  Involves additional costs, such as the cost of the token and any replacement fees.  Users always need to carry the token with them.  Users need multiple tokens for multiple Web sites and devices.  Does not protect fully from man-in-the-middle attacks (i.e., attacks where an intruder intercepts a user's session and steals the user's credentials by acting as a proxy between the user and the authentication device without the user's knowledge).
  • 14. BIOMETRICS •Biometrics has also some drawbacks. Suppose you select your fingerprint as a biometrics.. But what to do when you have crack or wound in your finger. And now a days some hackers even implement exact copy of your biometrics also….
  • 15.
  • 16. •The 3D passwords are more customizable, and very interesting way of authentication. •A 3D password is a multifactor authentication scheme that combine RECOGNITION +RECALL +TOKENS +BIOMETRICS in one authentication system.
  • 17.  The 3D password presents a virtual environment containing various virtual objects.  The user walks through the environment and interacts with the objects.  It is the combination and sequence of user interactions that occur in the 3D environment.  It becomes much more difficult for the attacker to guess the user’s 3-D password.
  • 18. Virtual objects  Virtual objects can be any object we encounter in real life: A computer on which the user can type in. A fingerprint reader that requires users fingerprint. A paper or white board on which user can type. An Automated teller(ATM) machine that requires a token. A light that can be switched on/off. A television or radio where channels can be selected. A car that can be driven. A graphical password scheme. A biometric recognition device. A staple that can be punched. A book that can be moved from one place to another.
  • 19. Snapshot of a proof - of - concept virtual art gallery
  • 20. System Implimentation The 3D password is a multi factor authentication scheme. The 3D password presents a 3D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3D password is simply the combination and the sequence of user interactions that occur in the 3D virtual environment. The 3D password can combine recognition, recall, token, and biometrics based systems into one authentication scheme. This can be done by designing a 3D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometric data to be verified. For example, the user can enter the virtual environment and type something on a computer that exists in (x1 , y1 , z1 ) position, then enter a room that has a fingerprint recognition device that exists in a position (x2 , y2 , z2 ) and provide his/her fingerprint. Then, the user can go to the virtual garage, open the car door, and turn on the radio to a specific channel. The combination and the sequence of the previous actions toward the specific objects construct the user’s 3D password.
  • 21. STATE DIAGRAM OF A 3D PASSWORD APPLICATION
  • 22. Example consider a user who navigates through the 3D virtual environment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types “CAT”. The user then walks over turns on the light located in (50,6,20) and then goes to a white board located in (55,3,30) and draws just one dot in the (x , y) coordinate of the white board at the specific point of (420,170). The initial representation of user actions in the 3D virtual environment can be recorded as follows:: *(10, 24, 91) Action = Open the office door; *(10, 24, 91) Action = Close the office door; *(4, 34, 18) Action = Typing, “C”; *(4, 34, 18) Action = Typing, “A”; *(4, 34, 18) Action = Typing, “T”; *(50, 6, 20)Action = Turning the light on; *(55, 3, 30)Action = Goes to white board; *(55, 3, 30)Action = Draws point = (420,170);
  • 23.
  • 25. 3D Virtual Environment •3-D virtual environment affects the usability, effectiveness, and acceptability of a 3-D password system. •We can use any real time object as a environment like any room or village but for simplicity we suggest to use small environment like room. 3D Virtual Environment
  • 26. The design of 3D virtual environments should follow these guidelines:  Real Life Similarity  Object Uniqueness & Distinction  3D Virtual Environment Size  Number of objects & their types
  • 27. Advantages  Flexibility:3D Passwords allows Multifactor authentication biometric, textual passwords can be embedded in 3D password technology.  Strength: This scenario provides almost unlimited passwords possibility.  Ease to Memorize: Can be remembered in the form of short story.  Respect of Privacy: Organizers can select authentication schemes that respect users privacy.
  • 28. Applications The 3D password’s main application domains are protecting critical systems and resources.  Critical Servers  Nuclear Reactors & Military Facilities  Airplanes and Missile Guiding
  • 29. Attacks and Countermeasures Brute Force Attack Well studied Attack  Shoulder-surfing Attack
  • 30. Brute Force Attack The attacker has to try all possible 3D passwords. This kind of attack is very difficult for the following reasons.  Time required to login .  3D Attacks are very expensive.
  • 31. Well Studied Attack The attacker tries to find the highest probable distribution of 3D passwords. In order to launch such an attack, the attacker has to acquire knowledge of the most probable 3D password distributions. This is very difficult because the attacker has to study all the existing authentication schemes that are used in the 3D environment. Moreover, a well studied attack is very hard to accomplish since the attacker has to perform a customized attack for every different 3D virtual environment design.
  • 32. Shoulder-surfing Attack An attacker uses a camera to record the user’s 3D password or tries to watch the legitimate user while the 3D password is being performed. This attack is the most successful type of attack against 3D passwords and some other graphical passwords. However, the user’s 3D password may contain biometric data or textual passwords that cannot be seen from behind. Therefore, we assume that the 3D password should be performed in a secure place where a shoulder surfing attack cannot be performed.
  • 33.  The authentication can be improved with 3D password, because the unauthorized person may not interact with same object at a particular location as the legitimate user.  It is difficult to crack, because it has no fixed number of steps and a particular procedure.  Added with biometrics and token verification this schema becomes almost unbreakable. Conclusion