Secure Human Authentication with Graphical Passwords

被引:1
|
作者
Dagvatur, Zayabaatar [1 ]
Mohaisen, Aziz [2 ]
Lee, Kyunghee [3 ]
Nyang, DaeHun [1 ]
机构
[1] InHa Univ, Comp Sci Dept, Incheon, South Korea
[2] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
[3] Univ Suwon, Comp Sci Dept, Suwon, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 04期
基金
新加坡国家研究基金会;
关键词
Security; Usability; Shoulder-surfing; Graphical passwords; Authentication; SCHEME; DESIGN;
D O I
10.3966/160792642019072004023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both alphanumeric and graphical password schemes are vulnerable to the shoulder-surfing attack. Even when authentication schemes are secure against a single shoulder-surfing attack round, they can be easily broken by intersection attacks, using multiple shoulder-surfing attacker records. To this end, in this paper we propose a graphical password-based authentication scheme to provide security against the intersection attack launched by an attacker who may record the user's screen, mouse clicks and keyboard input with the help of video recording devices and key logging software. We analyze our scheme's security under various threat models and show its high security guarantees. Various analysis, usability studies and comparison with the previous work highlight our scheme's practicality and merits.
引用
收藏
页码:1247 / 1259
页数:13
相关论文
共 50 条
  • [1] Secure User Authentication with Graphical Passwords and PassText
    Mohd, Raj Mohammed
    Bindu, C. Shoba
    Vasumathi, D.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 523 - 533
  • [2] Are Graphical Authentication Mechanisms As Strong As Passwords?
    Renaud, Karen
    Mayer, Peter
    Volkamer, Melanie
    Maguire, Joseph
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 837 - 844
  • [3] Authentication by Graphical Passwords Method 'Hope'
    Zujevs, Nikita
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 94 - 99
  • [4] Graphical Passwords: Requisite for Secure Information Systems
    Abbasi, Kashif
    Zin, Abdullah Mohd
    Mokhtar, Mohd Rosmadi
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 2809 - 2813
  • [5] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    [J]. QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [6] Investigating the Viability of Multifactor Graphical Passwords for User Authentication
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    [J]. INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 10 - 21
  • [7] TwoStep: An Authentication Method Combining Text and Graphical Passwords
    van Oorschot, P. C.
    Wan, Tao
    [J]. E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 233 - 239
  • [8] On Automated Image Choice for Secure and Usable Graphical Passwords
    Dunphy, Paul
    Olivier, Patrick
    [J]. 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 99 - 108
  • [9] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    [J]. SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632
  • [10] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355