Explore chapters and articles related to this topic
Centralized Conferencing System Architecture
Published in Radhika Ranjan Roy, Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP, 2020
A PIN is a special password case – a shared secret that is only numeric and often contains a fairly small number of bits (often as few as 10 bits or three digits). When conferencing systems are used for audio on the PSTN, there is often a need to authenticate using a PIN. Typically, if the user fails to provide the correct PIN a few times in a row, the PSTN call is disconnected. The rate of making the calls and getting to the point to enter a PIN makes it fairly hard to do an exhaustive search of the PIN space even for four-digit PINs. When using a high-speed interface to connect to a conferencing system, it is often possible to make thousands of attempts per second, and the PIN space could quickly be searched. Because of this, it is not appropriate to use PINs for authorization on any of the interfaces that provide fast queries or many simultaneous queries.
A Taxonomy of Bitcoin Security Issues and Defense Mechanisms
Published in Brij B. Gupta, Michael Sheng, Machine Learning for Computer and Cyber Security, 2019
A Personal Identification Number (PIN) is a code used to verify the identity of a user. Unlike passwords, it comprises only of numeric characters. In the earlier days, PIN was only used for transactions in Automated Teller Machine (ATM), but now its use has expanded to unlocking doors and smartphones. The user should avoid using PIN in series, like 1234,0000 and should also refrain from using generic information, like date of birth, vehicle number, as PIN. Longer PIN is more robust as the attacker needs to try more permutations and combinations to crack the PIN. Remembering many PINs for different cards is a tiresome job for the user, so here the role of password managers comes in. They store the records of the account and its corresponding PIN. There are many innovative ways to create PIN, like picking up numeric base against alphabets; for example, bitcoin will translate to 2920315914.
Bluetooth: State of the Art, Taxonomy, and Open Issues for Managing Security Services in Heterogeneous Networks
Published in N. Jeyanthi, Kun Ma, Thinagaran Perumal, R. Thandeeswaran, Managing Security Services in Heterogenous Networks, 2020
(1) Pin Theft Attack – The PIN is stolen to establish connection with the target device to carry out malicious activities. The attacker snoops the pairing process, gets the necessary data, and uses a brute-force algorithm to find the used PIN. Next, the attacker lists all the probable variations of the PIN. To identify the correct initialization key, they use a 128-bit random number, if the MAC address of Bluetooth device is already known. The collected data is used to find the shared session link. The PIN is easily cracked if all the collected information is correct PIN can be easily cracked [[23]; D. K. Nilsson et al. [24]].
PClusBA: A Novel Partition Clustering-Based Biometric Authentication Mechanism
Published in IETE Journal of Research, 2022
Nageswari Amma N.G., Bhuvaneswari Amma N.G.
Identity theft is one of the potential threats to any confidential transaction. Authentication is the process of confirming the identity of the individual participating in any process to confirm their origin and authenticity [1]. Personal Identification Number (PIN)/password, smart card/security token, and biometrics are some of the commonly used authentication mechanisms. The PIN has the obvious disadvantage of either the user failing to remember it or the PIN being compromised by brute force attacks and cryptanalysis. Biometrics proves to be one of the efficient methods for authentication for the very reason that it overcomes the vulnerability of being faked. Universality, uniqueness, and permanence are the characteristics that make biometrics suitable for security applications [2].
Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities
Published in International Journal of Production Research, 2020
Yanling Chang, Eleftherios Iakovou, Weidong Shi
(a) Secure and efficient container release. Traditionally, a truck driver or a shipper picks up containers by a PIN code when the containers arrive in the port, ensuring that the right person picks up the right box. The container-specific PIN code is initially generated by the port terminal operator, and then is transmitted along to the forwarder and the subsequent carrier. The latter often subcontracts the job to another haulage company and thus the PIN code has to be passed via a number of parties before it reaches the right driver by all sorts of means including email, fax, SMS, etc. Malicious entities can simply intercept the PIN code and a legal dispute has aroused due to the usage of PIN code (Didier 2017).