Next Article in Journal
Real-time Controlling Dynamics Sensing in Air Traffic System
Next Article in Special Issue
Uplink Non-Orthogonal Multiple Access with Channel Estimation Errors for Internet of Things Applications
Previous Article in Journal
Toward a Robust Multi-Objective Metaheuristic for Solving the Relay Node Placement Problem in Wireless Sensor Networks
Previous Article in Special Issue
Exploiting Layered Multi-Path Routing Protocols to Avoid Void Hole Regions for Reliable Data Delivery and Efficient Energy Management for IoT-Enabled Underwater WSNs
Open AccessArticle

A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices

1
Faculty of Computing and Information Technology, University of Sialkot, Sialkot 51040, Pakistan
2
College of Computer Science and Engineering, University of Jeddah, Jeddah 21577, Saudi Arabia
3
School of Computing, Mathematics, and Digital Technology, Manchester Metropolitan University, Manchester M15 5RN, UK
4
Faculty of Science and Technology, University of the Faroe Islands, FO-100 Tórshavn, Denmark
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(3), 678; https://doi.org/10.3390/s19030678
Received: 5 January 2019 / Revised: 24 January 2019 / Accepted: 25 January 2019 / Published: 7 February 2019
(This article belongs to the Special Issue Future Research Trends in Internet of Things and Sensor Networks)
The prevalence of smart devices in our day-to-day activities increases the potential threat to our secret information. To counter these threats like unauthorized access and misuse of phones, only authorized users should be able to access the device. Authentication mechanism provide a secure way to safeguard the physical resources as well the information that is processed. Text-based passwords are the most common technique used for the authentication of devices, however, they are vulnerable to a certain type of attacks such as brute force, smudge and shoulder surfing attacks. Graphical Passwords (GPs) were introduced as an alternative for the conventional text-based authentication to overcome the potential threats. GPs use pictures and have been implemented in smart devices and workstations. Psychological studies reveal that humans can recognize images much easier and quicker than numeric and alphanumeric passwords, which become the basis for creating GPs. In this paper a novel Fractal-Based Authentication Technique (FBAT) has been proposed by implementing a Sierpinski triangle. In the FBAT scheme, the probability of password guessing is low making system resilient against abovementioned threats. Increasing fractal level makes the system stronger and provides security against attacks like shoulder surfing. View Full-Text
Keywords: Authentication; shoulder surfing; graphical password scheme; fractal; Sierpinski triangle; smart devices Authentication; shoulder surfing; graphical password scheme; fractal; Sierpinski triangle; smart devices
Show Figures

Figure 1

MDPI and ACS Style

Ali, A.; Rafique, H.; Arshad, T.; Alqarni, M.A.; Chauhdary, S.H.; Bashir, A.K. A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices. Sensors 2019, 19, 678.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop