Secure Human Authentication with Graphical Passwords

被引:2
|
作者
Dagvatur, Zayabaatar [1 ]
Mohaisen, Aziz [2 ]
Lee, Kyunghee [3 ]
Nyang, DaeHun [1 ]
机构
[1] InHa Univ, Comp Sci Dept, Incheon, South Korea
[2] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
[3] Univ Suwon, Comp Sci Dept, Suwon, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 04期
基金
新加坡国家研究基金会;
关键词
Security; Usability; Shoulder-surfing; Graphical passwords; Authentication; SCHEME; DESIGN;
D O I
10.3966/160792642019072004023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both alphanumeric and graphical password schemes are vulnerable to the shoulder-surfing attack. Even when authentication schemes are secure against a single shoulder-surfing attack round, they can be easily broken by intersection attacks, using multiple shoulder-surfing attacker records. To this end, in this paper we propose a graphical password-based authentication scheme to provide security against the intersection attack launched by an attacker who may record the user's screen, mouse clicks and keyboard input with the help of video recording devices and key logging software. We analyze our scheme's security under various threat models and show its high security guarantees. Various analysis, usability studies and comparison with the previous work highlight our scheme's practicality and merits.
引用
收藏
页码:1247 / 1259
页数:13
相关论文
共 50 条
  • [21] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [22] Captcha As Graphical Passwords-Enhanced With Video-Based Captcha For Secure Services
    Anjitha, K.
    Rijin, I. K.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 213 - 217
  • [23] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [24] Synthesis of Secure Passwords
    Sato, Tomoki
    Kikuchi, Hiroaki
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 35 - 43
  • [25] Provably secure RSA-based remote user authentication protocol using passwords
    Wang, Ding
    Wang, Ping
    Li, Zeng-Peng
    Ma, Chun-Guang
    Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2015, 35 (01): : 191 - 204
  • [26] Investigating the Viability of Multifactor Graphical Passwords for User Authentication (vol 23, pg 10, 2014)
    Jali, Mohd Zalisham
    Furnell, Steven M.
    Dowland, Paul S.
    INFORMATION SECURITY JOURNAL, 2022, 31 (02): : 251 - 251
  • [27] Eye Tracking Graphical Passwords
    Mihajlov, Martin
    Jerman-Blazic, Borka
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 37 - 44
  • [28] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950
  • [29] Selecting secure passwords
    Verheul, Eric R.
    Topics in Cryptology - CT-RSA 2007, Proceedings, 2007, 4377 : 49 - 66
  • [30] PASSWORDS PHILOLOGY, SECURITY, AUTHENTICATION
    Lennon, Brian
    DIACRITICS-A REVIEW OF CONTEMPORARY CRITICISM, 2015, 43 (01): : 82 - 107