Secure Human Authentication with Graphical Passwords

被引:2
|
作者
Dagvatur, Zayabaatar [1 ]
Mohaisen, Aziz [2 ]
Lee, Kyunghee [3 ]
Nyang, DaeHun [1 ]
机构
[1] InHa Univ, Comp Sci Dept, Incheon, South Korea
[2] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
[3] Univ Suwon, Comp Sci Dept, Suwon, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 04期
基金
新加坡国家研究基金会;
关键词
Security; Usability; Shoulder-surfing; Graphical passwords; Authentication; SCHEME; DESIGN;
D O I
10.3966/160792642019072004023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both alphanumeric and graphical password schemes are vulnerable to the shoulder-surfing attack. Even when authentication schemes are secure against a single shoulder-surfing attack round, they can be easily broken by intersection attacks, using multiple shoulder-surfing attacker records. To this end, in this paper we propose a graphical password-based authentication scheme to provide security against the intersection attack launched by an attacker who may record the user's screen, mouse clicks and keyboard input with the help of video recording devices and key logging software. We analyze our scheme's security under various threat models and show its high security guarantees. Various analysis, usability studies and comparison with the previous work highlight our scheme's practicality and merits.
引用
收藏
页码:1247 / 1259
页数:13
相关论文
共 50 条
  • [31] PASSWORDS: PHILOLOGY, SECURITY, AUTHENTICATION
    Baetens, Jan
    LEONARDO, 2019, 52 (02) : 205 - 206
  • [32] Passwords: Philology, Security, Authentication
    Jackson, Mitch K.
    SURVEILLANCE & SOCIETY, 2021, 19 (02) : 279 - 281
  • [33] Passwords: Philology, Security, Authentication
    Dillon, Michael
    SYMPLOKE, 2020, 28 (1-2) : 596 - 598
  • [34] Passwords and the Evolution of Imperfect Authentication
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    COMMUNICATIONS OF THE ACM, 2015, 58 (07) : 78 - 87
  • [35] MESSAGE AUTHENTICATION AND DYNAMIC PASSWORDS
    BEKER, HJ
    COLE, GM
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 304 : 171 - 175
  • [36] Passwords: Philology, Security, Authentication
    Huskey, Samuel J.
    TECHNOLOGY AND CULTURE, 2019, 60 (04) : 1126 - 1127
  • [37] Passwords: Philology, Security, Authentication
    Vadde, Aarthi
    AMERICAN LITERATURE, 2020, 92 (04) : 820 - 824
  • [38] Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication
    Rass, Stefan
    Schuller, David
    Kollmitzer, Christian
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 166 - +
  • [39] Enhancing Visual Passwords Using a Grid-Based Graphical Password Authentication to Mitigate Shoulder Surfing
    Paul, P. Mano
    Jingle, I. Berin Jeba
    Jingle, I. Diana Jeba
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 447 - 455
  • [40] A study on priming methods for graphical passwords
    Parish Z.
    Salehi-Abari A.
    Thorpe J.
    Journal of Information Security and Applications, 2021, 62