Vous êtes sur la page 1sur 4

CHAPTER II

Foreign literature
Door lock security systems are classified based on technologies used
1) Password based -The programmable electronic code lock device is programmed in such a way
that it will operates only with the correct entry of predefined digits.

2) Biometric based-The palmtop recognition is the next step for fingerprint recognition.

3) smart card based-In many door lock security systems, GSM is used for communication
purpose. The purpose of a work cultivated by utilization of a circuits like a GSM module which
gets activated by a controller for sending SMS in emergency to proprietor and for sending
corresponding services of security at the time of break in.

4) RFID based-These types of security systems used for digital door lock are utilizing inactive
RFID tags (passive). With the help of this, it ensures that only valid person can get entry.

5) Door phone based-The earlier system, a specific system in which identification of a visitant is
done for the most part by direct communication with the set of the housing estate concerned.

6)iot based- Would you be surprised to learn that the first mechanical lock and key were invented
about the same time as the first message encoding keys? Mechanical security keys, for doors,
gates, living spaces, etc. date back over six thousand years to the time of the Pharaohs.

Ref:International Journal of Computer Applications (0975 – 8887)


Volume 153 – No2, November 2016

Dangers Implemeting new technologies

High-tech devices have an important role to play When it comes to security but there is real
danger in implemening the newest technologies and assuming that they are unbreakable.in fact
many commonly used high-tech devices and systems can be broken by the simplest means.this is
due in part to users not understanding how the systems work.

Ref: Chapter II:Information Technology (IT) Security by Kären m. Hess page 309

STATIC PASSWORDS IN CLEARTEXT


Unquestionably, the most ubiquitous authentication scheme employed on the internet
today is based on static passwords.A user chooses or is assigned in account name and an
associated password Something secret that only the user should know.

Ref:internet security techniques by larry j hughes jr page 69

Running a password guesser


it is a good idea to probe the security of your users passwords before the attacker does by
running a password guesser.this is the best done on a routine basis daily if at all possible.if the
size of your password file is prohibitively large for this frequency consider once or twice per
week instead.
Ref:internet security techniques by larry j hughes jr page 72

PREVENTING UNSECURE PASSWORDS


A practical way to solve unsecure password problem is to practively prevent them.this may not
altogether obviate the need to run a password guesser but it can lessen the frequency that you
need to run it.Most logins today are protected by a password. If an attacker can get your
password, he can access your account and do anything you could do with that account. So when
you ask how secure your account is, you’re really asking how safe your password is.
Ref:internet security techniques by larry j hughes jr page 72

SHADOWS PASSWORDS AND PASSWORDS AGING


Many newer versions of unix sport security enhancements like shadow passwords and password
aging.these are two hoghly desiarable features usually implemented together that provide a
significant measure of security to a system.
Because the passwd file is world-readable, encrypted passwords have been moved to a separate
file /etc/shadow. Its first field is the account name (just like the passwd file) and the file is colon-
delmited. /etc/shadow is readable only by root (actually its permissions are 0). It is also in a
special SELinux context. The addition of this separate file of encrypted passwords also allowed
the addition of new account parameters to control account and password aging. These are the
remaining fields in the shadow file.
Ref:internet security techniques by larry j hughes jr page 75
BRUTE FORCE ATTACK
The brute-force attack is still one of the most popular password cracking methods. Nevertheless,
it is not just for password cracking. Brute-force attacks can also be used to discover hidden pages
and content in a web application. This attack is basically “a hit and try” until you succeed. This
attack sometimes takes longer, but its success rate is higher. In this article, I will try to explain
brute-force attacks and popular tools used in different scenarios for performing brute-force attack
to get desired results.
Link: https://resources.infosecinstitute.com/popular-tools-for-brute-force-attacks/#gref

LOCAL LITERATURE

As per the requirements, authors developed the systems. And as per our knowledge, not a single
system is suitable for all types of applications. Day by day technologies are developing and
techniques of robbery are also developing. So, need you is to develop a new smart and
unbreakable technique in further studies.
The oldest known mechanical functioning lock was an Egyptian door lock used about 2000BC,
made of wood and fastened vertically on the door post, the wooden block contained
moveable pins or “pin tumblers” that dropped by gravity into openings in the cross piece of
“bolts” and locked the door. It was operated by a wooden key with pegs
that raised the number of tumblers sufficiently to clear the bolt so that it could be pulled back.
The major disadvantage with it is that it was wholly made of wood as in with the fast growing of
technology, the lock has evolved from only pure mechanical type into electrical and electronic
type. With the assemblage of electronic and mechanic at system, the lock has developed into a
high-tech style which uses some special authentication method. Usually, it is called electronic
lock or smart lock as it can operate based on the given information. In the current market, there
are many authentication methods to trigger the electronic lock including, button sequence, radio
frequency identification (RFID), biometric, security token and etc. Generally, these kinds of
authentication use the embedded system to process or verify password or data entered by the
users. The intruders have to spend quite a time to crack these kinds of high-tech lock as in is
about the electronic code lock, which is designed to respond to an electronic logic signal
mechanism, with a digit sequence counter performing the function of a key. They are operated
by inputting the correct code by external means through a keypad into a microcontroller which
already have a pin number in its EEPROM memory (internal) to compare with, so that if itis
correct (that is the pin number inputted by the user), It activates the port to which the LED is
connected (the load that represents the door) as in. However, password seems to be the main
authentication method for some period due to the consideration of dependability, safety, user
friendly of the technologies and confidentiality. but there will always a conflict between safety
and user friendly as in when we think of locks, we think of a bolt containing a notch known as a
talon, which is operated by moving the bolt backwards or forward by engaging a key in the talon.
But there is more to locks than just a bolt or latch. A lock is a mechanical device that can be Use
for securing doors, cabinets, lid of brief cases or other luggage as in

Source: https://www.scribd.com/document/234082222/Literature-Review

Vous aimerez peut-être aussi