Investigating the Viability of Multifactor Graphical Passwords for User Authentication

被引:1
|
作者
Jali, Mohd Zalisham [1 ]
Furnell, Steven M. [2 ,3 ]
Dowland, Paul S. [2 ]
机构
[1] USIM, Fac Sci Technol, Bandar Baru Nilai 71800, Negeri Sembilan, Malaysia
[2] Univ Plymouth, Ctr Secur Commun & Network Res CSCAN, Plymouth, Devon, England
[3] Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia
来源
INFORMATION SECURITY JOURNAL | 2014年 / 23卷 / 1-2期
关键词
authentication; graphical passwords; knowledge-based authentication; security; usability;
D O I
10.1080/19393555.2014.891274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication using images (i.e., graphical passwords) is claimed to be one of the alternatives for overcoming weaknesses in the traditional username and password authentication. This paper reports on the study to explore the feasibility of combining two graphical password methods for better security. A graphical password prototype scheme, the Enhanced Graphical Authentication System (EGAS), was developed (which combines the methods of clicking on the image (i.e., click-based) and selecting a series of images (i.e., choice-based). The EGAS was tested by 30 participants randomly chosen from the authors' university and two evaluations were made; namely user performance of the combined method and the feasibility of authentication strategies toward the introduced method itself. From both evaluations, it is found that positive results have been obtained, which suggest that these methods could be combined together effectively without giving impediment to users.
引用
收藏
页码:10 / 21
页数:12
相关论文
共 50 条
  • [31] Graphical dictionaries and the memorable space of graphical passwords
    Thorpe, J
    van Oorschot, PC
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 135 - 150
  • [32] Secure Multifactor Remote Access User Authentication Framework for IoT Networks
    Alshahrani, Mohammed Mujib
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 3235 - 3254
  • [33] Graphical User Authentication Algorithms Based on Recognition: A Survey
    Saadi, Zena M.
    Sadiq, Ahmed T.
    Akif, Omar Z.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2024, 12 (02): : 79 - 93
  • [34] The design and analysis of graphical passwords
    Jermyn, I
    Mayer, A
    Monrose, F
    Reiter, MK
    Rubin, AD
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 1 - 14
  • [35] User interface design affects security: patterns in click-based graphical passwords
    Chiasson, Sonia
    Forget, Alain
    Biddle, Robert
    van Oorschot, P. C.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 387 - 398
  • [36] Eye Tracking Graphical Passwords
    Mihajlov, Martin
    Jerman-Blazic, Borka
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 37 - 44
  • [37] The Presentation Effect on Graphical Passwords
    Thorpe, Julie
    Al-Badawi, Muath
    MacRae, Brent
    Salehi-Abari, Amirali
    32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2947 - 2950
  • [38] User interface design affects security: patterns in click-based graphical passwords
    Sonia Chiasson
    Alain Forget
    Robert Biddle
    P. C. van Oorschot
    International Journal of Information Security, 2009, 8 : 387 - 398
  • [39] A Contemplate on MultiFactor Authentication
    Sharma, Priyanka
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 824 - 827
  • [40] Multifactor Authentication Device
    Kadlec, Jaroslav
    Vrba, Radimir
    Kuchta, Radek
    PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS 2011), 2011, : 77 - 82