Professional Documents
Culture Documents
Jyotsana Raut
4t h yr/ 8th sem I.T
Nikita Agashe
4t h yr/ 8th sem I.T
Trupti Sapate
Pranali Doifode
D.B.A.C.E.R, Nagpur
I. Introduction
i.e. the single switch dedicated for input of morse
codes. This single switch is the only interacting input
We are aiming to develop a minimal system, which is
device given to the user.
highly simplified in the context of its interface with
the user. For the new, or novice user, such a system,
691
the only switch he has. Hence, nonthe switch for a specified amount of
resetting of currently gathered password
system begins to wait for the user to
password from the beginning.
Authentication Module
of the project will be decided based on an analysis of
the
The authentication module compares the entered
password with the set of stored Password(s). If a
switch pressing behaviours of various users. A range
match is found, it is assumed that the user whose
between 250-550 mSec seems an appropriate choice
password it belongs to is the one trying to log in. This
for most people.
assumption is done because there arent two input
fields of user name and password for the user to
Similarly, a DASH is decoded when the switch is
log in, but rather he is determined by the password he
pressed for a duration longer than 300 mSec.
enters
However, this will also have to be a defined range
rather than just a condition. A range of 800-1400
If the entered password IS A match to a stored
mSec seems like an appropriate value.
password, the System Validates the authentication
and access is granted. When we have attached our
Password String
Morse Security System to a
The Password string is actually a String type variable
Protot ype Demo Vault or a Door, the system causes
in the Morse Symbol Collection Unit. This string is
the vault or door to get unlocked upon entering the
initially empty thus having a NULL value. As and
correct password.
when each symbol is decoded, it is appended to this
password string variable. Thus the password string is
Wrong Password
appended with dots and dashes as the user enters his
password.
If the user enters a wrong password, the
authentication module increments a wrong password
Timeout Condition
counter, for consecutive wrong attempts. If a
password is entered after a wrong attempt, the wrong
A timeout condition is defined to reset the received
password counter is reset to 0, thus ensuring that only
and decoded password string and start from
consecutive attempts are logged via incrementing. A
692
Morse System
system. It is the goal of any authentication system to
make the system impenetrable, un-hackable, and
Beginning in 1836, the American artist Samuel F. B.
immune to attacks. Most of the conventional systems
Morse, the American physicist Joseph Henry, and
available however, fail to deliver on some if not all of
Alfred Vail developed an electrical telegraph system.
these counts. Consider the most common types of
This system sent pulses of electric current along
attack. May it be the low tech shoulder surfing, where
wires which controlled an electromagnet that was
a person tries to obtain the password by simply
located at the receiving end of the telegraph system.
prying in and trying to look when the person is
A code was needed to transmit natural language using
entering his or her password. Some people who
modern international morse code.
yhhave a rather modest experience with such
techniques, gain expertise in obtaining the sequence
a. Keystroke dynamic
and digits of the passwords, say in a numeric keypad
by simply observing the hand motions of the person
Keystroke dynamics is part of a larger class of
who is entering the password. A professional low
biometrics known as behavioural biometrics; their
tech technique is to use fluorescent dye in powder
patterns are statistical in nature. It is a commonly
form to be sprinkled over a recently used keypad,
held belief that behavioural biometrics are not as
which makes the buttons that were pressed glow, as
reliable as physical biometrics used for authentication
the fluorescent dye highlights the body oils that stick
such as fingerprints or retinal scans or DNA. The
on to the buttons while they were pressed. Such
reality here is that behavioural
biometrics use a
bi ometric
the start-up
693
.
In other less dramatic cases, an employee might
violate business rules by sharing his password with
his secretary, or by logging onto a system but then
Following Projects were
leaving the computer logged-in while someone else
referred
he knows about or doesn't know about uses the
Auto Disabling Security
system. Keystroke dynamics is one way to detect
System for Speed Based
such problems suffi ciently reliably to be worth
Authentication
investigating, because even a 20% true-positive rate
Morse Coding System for
would send the word out that this type of behaviour is
Rapid Emergency
being watched and caught.
Signalling
Sample Durations Based
Voice Passwords for
Singing Unlock Systems.
694