An Efficient Graphical Authentication System
DOI:
https://doi.org/10.51983/ajsat-2017.6.1.937Keywords:
Graphical Passwords, Authentication, Shoulder, Surfing, AttackAbstract
Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.
References
Phen-Lan Lin, Li-Tung Weng and Po-Whei Huang, "Graphical passwords using images with random tracks of geometric shapes," 2008 Congress on Images and Signal Processing. 2008.
Sacha Brostoff, M. Angela Sasse, "Are Passfaces More Usable Than Passwords? A Field Trial Investigation," 2000.
Dhamija R. and Perrig A., "Déjà vu: A User Study Using Images for Authentication," in Proceedings of 9th USENIX Security Symposium, 2000.
Davis, F. Monrose, and M. K. Reiter, "On user choice in graphical password schemes," in Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004.
K. Bicakci, N. B. Atalay, M. Yuceel, H. Gurbaslarand B. Erdeniz, "Towards usable solutions to graphical password hotspot problem," In 33rd Annual IEEE International Computer Software and Applications Conference, 2009.
Weinshall D., "Cognitive Authentication Schemes Safe against Spyware," in IEEE Symposium on Security and Privacy (S&P), 2006.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.