Common PIN-entry schemes are vulnerable to observation attacks. To enhance the resistance to observation attacks, some observation attacks resistant PIN-entry schemes for mobile devices based on audios and/or haptics have been proposed. However, none of existing observation attacks resistant PIN-entry schemes can achieve both good security and high usability. Herein, we propose a new observation attacks resistant PIN-entry scheme, Loc-HapPIN, for touchscreen devices providing localized haptic feedback. By using the technology of localized haptic feedback, the usability and the resistance to observation attacks are improved.
Furthermore, the user can choose the efficiency-security setting suitable for him.
Keywords-shoulder surfing, password authentication, observation attack, PIN entry scheme
In existence without the proper usage of security or locks in Mobile Phones which leads to vulnerability of stealing others personal information. This personal information involves misusing others photo’s, banking details, getting some important documents being misused by others without proper security scheme.
The problem of security is growing very bad due to smart phone usage.
This project is a mobile application based project to enhance security. “PIN SECURITY SCHEME USING HAPTIC FEEDBACK” is a user-friendly software application. The purpose of this project is to provide a better security, a software solution that delivers a scalable, secure, and reliable application that maintains and manages the application details. The following Document will outline the feature of the “PIN SECURITY SCHEME USING HAPTIC FEEDBACK” and the requirements that the project will adhere to developing the software for the user security purpose.
A fingerprint scanner is a type of technology that identifies and authenticates the fingerprints of an individual in order to grant or deny access to a computer system or a physical facility[4].A password is a string of characters used to verify the identity of a user during the authentication process. Passwords can vary in length and can contain letters, numbers and special characters[1].The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. Most mobile phone users lock their devices with PIN codes to prevent fraudulent use in case the phone set is lost or stolen [5].[8]proposed an audio based observation attacks resistant four digit pin entry scheme using earphones, the audio version of phone lock. However, as the user’s operation burden is rather high, its usability is insufficient. In the same year, an audio based observation attacks resistant four digit pin entry scheme using earphones, spin lock was proposed.
In finger print scanning scheme, the lock can be easily grabbed by other person if we have gently kept the finger in any of the objects.
In password lock, passwords can be easily grabbed using shoulder surfing attack where the other person can easily misuse the observed password.
In PIN lock schemes, PIN can contain only 4digits which can be easily guessed and it also undergoes shoulder surfing attack.
The main idea behind this application is to enhance the security. Initially the user register the required fields and get the OTP. Haptic feedback system is available to prevent shoulder surfing attacks that sends OTP to any registered mobile GSM device.The Random vibration for the each pin is generated. If someone try to misuse the pin their image is been capture and sent to the owner’s registered mobile number.
A pseudo-random number generator (PRNG) is a program written for, and used in, probability and statistics applications when large quantities of random digits are needed. Most of these programs produce endless strings of single-digit numbers, usually in base 10, known as the decimal system. When large samples of pseudo-random numbers are taken, each of the 10 digits in the set {0,1,2,3,4,5,6,7,8,9} occurs with equal frequency, even though they are not evenly distributed in the sequence.
Pseudo Random method which can be reproducible if the algorithm is found. The very existence of the algorithm, no matter how sophisticated, means that the next digit can be predicted! This has given rise to the term pseudo-random for such machine-generated strings of digits. They are equivalent to random-number sequences for most applications, but they are not truly random according to the rigorous definition.
The Haptic feedback is a security scheme in which we need to register the required details and a phone number is registered for recovery purpose and an OTP is generated. A verification is done by sending an OTP to the registered number and an security question and answer is been set to recover the forget password. If someone try to access it will capture the persons image and will send to the registered number .Haptic Feedback, often referred to as simply “haptics”, is the use of the sense of touch in a user interface design to provide information to an end user. When referring to mobile phones and similar device, this generally means the use of vibration from the device’s vibration.
The objective of my project is to secure a proper app lock for different applications.This is done by random vibration technique using a pure random variable is based on atmospheric parameter so it cannot be reproduced. This vibration is used to count the already registered pin. After vibration if you press enter the apps that are secured will be shown.
A Hardware Random Number Generator (HRNG) is a device that generates random numbers from a physical process, rather than by means of an algorithm. Such devices are often based on microscopic phenomena that generate low-level, statistically random “noise” signals, such as thermal noise, the photoelectric effect, involving a beam splitter, and other quantum phenomena. These stochastic processes are, in theory, completely unpredictable, and the theory’s assertions of unpredictability are subject to experimental test. This is in contrast to the common paradigm of pseudo-random number generation commonly implemented in computer programs or cryptographic hardware.
A hardware random number generator typically consists of a transducer to convert some aspect of the physical phenomena to an electrical signal, an amplifier and other electronic circuitry to increase the amplitude of the random fluctuations to a measurable level, and some type of analog to digital converter to convert the output into a digital number, often a simple binary digit 0 or 1. By repeatedly sampling the randomly varying signal, a series of random numbers is attained.
The main application for electronic hardware random number generators is in cryptography, where they are used to generate random cryptographic keys to transmit data securely. They are widely used in Internet encryption protocols such as Secure Sockets Layer (SSL).
The project is about the PIN security scheme using Haptic Feedback. The objective of this application is to find whether the existing app locks are secured are not. This is done by random vibration using Sqlite. This is used to count the registered PIN with the vibration.These are the modules of PIN security scheme using Haptic feedback.
The user need to register the required details to know that the required person use the mobile Username, mail-id and the recovery phone number is set first and stored in the Database after the completion of first page, The second page with further details get displayed by clicking next.
An OTP is sent to the registered number after submitting the first page. Enter the OTP, if you enter any number randomly you will get error message that your OTP is wrong. You are able to enter the password the limit of the password is restricted only to 4digit, the security question can be entered by the user and the security answer is also set by the user all the details are stored in the Database by clicking next.
From the registration module-2 we have saved a password for the password for each pin we get vibration between (1-5)times. Enter the pin after the vibration stops then the vibration starts for the second pin this step repeats for each registered pin. After the pin is entered. Press entered. If the password and the vibration matches if the pin that we have entered is right then we go to the next module the app which is secured will display.
If the password is wrong we will get the forgot password the security question which we have registered is displayed in forgot password enter the correct answer for that question the password that we have saved is sent to the registered number.
In this module, if anyone sees our generated one time password and then they try to retype and unlock any app, then their image will be captured and sent to registered mobile number. So misusing of our mobile by others can be easily identified.
No modification in the existing hardware
Same Mobile application can be developed for others Mobile operating systems such as Windows, iOS etc.
Existing software is developed for Mobile phones of Android operating system with lollipop version and below. Same app can be developed for higher android version.
In future, the user could able to select any applications available in his mobile phone, so the selected applications can be secured.
The project PIN security scheme using Haptic feedback is very simple in design and to implement. The mobile requires very low resources and works in almost all configurations and its interface is very user-friendly. It include registration of the user, then the random vibrations are counted which is added with already existing PIN and new password is generated every time. The generated new password is been typed to unlock an app.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download