Easy-Auth: Graphical Password Authentication using a Randomization Method

被引:1
|
作者
Harshini, Mudarabilli [1 ]
Sai, Padigala Lakshman [1 ]
Chennamma, Singam [1 ]
Thanuja [1 ]
Reddy, Alavalapati Goutham [1 ]
Kim, Hyun Sung [2 ]
机构
[1] NIT Andhra Pradesh, Dept Comp Sci & Engn, Tadepalligudem 534101, Andhra Pradesh, India
[2] Kyungil Univ, Sch Comp Sci, Kyungbuk 38428, South Korea
基金
新加坡国家研究基金会;
关键词
authentication; graphical password; security; Performance; PASSPOINTS;
D O I
10.1109/LATINCOM53176.2021.9647825
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graphical authentication methods have established themselves as a viable alternative to more established methods of authentication. The analysis of existing graphical authentication systems reveals that several of them compromise security by simplifying the method, making it possible to execute a variety of attacks such as hidden camera, guessing, shoulder surfing, and smudge. Additionally, some of them make performance sacrifices for security. Nonetheless, this article proposes a new graphical password method, Easy-Auth, that is immune to the aforementioned attacks. Easy-Auth dynamically repositions the images and limits the number of login attempts, thereby increasing its security. Easy-Auth is evaluated in terms of security by comparing with its counterparts.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Authentication using Alignment of the Graphical Password
    Shenoy, Manjula
    Supriya, A.
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [2] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386
  • [3] Enhancement of Password Authentication System Using Graphical Images
    Bhand, Amol
    Desale, Vaibhav
    Shirke, Swati
    Pansambal , Suvarna
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 217 - 219
  • [4] Graphical password authentication using cued click points
    Chiasson, Sonia
    van Oorschot, P. C.
    Biddle, Robert
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 359 - +
  • [6] Password Recovery Using Graphical Method
    Kharudin, Wafa' Mohd
    Din, Nur Fatehah Md
    Jali, Mohd Zalisham
    [J]. PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 11 - 20
  • [7] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [8] Token-based graphical password authentication
    Gyorffy, John Charles
    Tappenden, Andrew F.
    Miller, James
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 321 - 336
  • [9] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [10] A Tabular Steganography Scheme for Graphical Password Authentication
    Lin, Tsung-Hung
    Lee, Cheng-Chi
    Tsai, Chwei-Shyong
    Guo, Shin-Dong
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2010, 7 (04) : 823 - 841