Password Authentication System using Coordinates & Location
Angeline R1, Riddhi Dutta2, Rajesh Kumar Yadav3, Mohit Sharma4
1Angeline R, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, India.
2Riddhi Dutta, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, India.
3Rajesh Kumar Yadav, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, India.
4Mohit Sharma, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai, India.
Manuscript received on October 11, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 54-57 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4384119119/2019©BEIESP | DOI: 10.35940/ijitee.A4384.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Password authentication system is a very important factor for every system which needs to be secure. Every password is easy to crack and people are looking for a strong password to their systems. Here we use a password authentication system that is designed for high security and could be easily put into old system. In our frame work we are using cryptographic representation for converting location point into coordinates. Our primary aim is to prevent hacking through all kinds of brute force algorithms. It is concerned with including client’s geographical location as an important authentication factor to enhance security. Techniques to integrate location as an authentication factor as well as techniques to generate location based cryptographic keys are reviewed and discussed .Most importantly our system combine graphical user authentication and location coordinates .Existing system was vulnerable to dictionary attack algorithm and salt data algorithm ,so efforts are been taken to generate non repeatable graphical user interface system using coordinates .
Keywords: Authentication, Coordinates, Graphical, Location, Security, User Interface.
Scope of the Article: GPS and Location-Based Applications