CONTEMPLATING SKILL-BASED AUTHENTICATION

被引:0
作者
Renaud, Karen
Maguire, Joe [1 ]
van Niekerk, Johan [2 ]
Kennes, Demetris [3 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow, Lanark, Scotland
[2] Nelson Mandela Metropolitan Univ, Elizabeth, South Africa
[3] Deloitte Ltd, Enterprise Risk Serv, Limassol, Cyprus
来源
SAIEE AFRICA RESEARCH JOURNAL | 2014年 / 105卷 / 02期
关键词
Authentication; Knowledge; Skills;
D O I
10.23919/SAIEE.2014.8531918
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Humans develop skills as they go through their lives: some are fairly common, such as reading, but others are developed to maximise employment opportunities. These skills develop over a long period of time and are much rarer. Here we consider whether we can exploit this reality in the security arena, specifically to achieve a stronger form of authentication. Authentication has traditionally been performed based on what users know, hold or are. The first is the most popular, in the form of the password. This is often referred to as "knowledge-based" authentication. Yet, rigorously following guidelines for password creation produces forgettable gibberish and nonsense strings, not knowledge. Nonsense is hard to remember and users engage in a number of coping strategies to ameliorate this, and these tend to weaken the authenticator. It would be beneficial to find a way of reducing this memorial load, to identify a more usable mechanism. This is hard: usually reducing the memorial load also makes the secret easier to guess. The challenge is in finding a way to reduce memory load while holding the line as far as strength is concerned. Here we contemplate exploiting recognition of artefacts resulting from experts practicing their craft: "skill-based" authentication. This should reduce the memorial load and effort, but also, crucially, make it harder for a random intruder to replicate. We report on how we trialled SNIPPET, a prototype of an authentication mechanism that relied on an expert programmer identifying his/her own code snippets from successive challenge sets. We found that our participants were all able to identify their own code snippets and that other participants were unable to guess these, even when they observed the legitimate person authenticating beforehand. These findings are not conclusive given the small number of participants but they do show promise and suggest that this is an area worth pursuing. We conclude by returning to the three NIST-identified forms of authentication and consider how SNIPPET can be positioned within the general authentication arena.
引用
收藏
页码:48 / 62
页数:15
相关论文
共 78 条
[1]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[2]  
Anastasi J. S., 2006, N AM J PSYCHOL
[3]  
Anderson LW., 2001, TAXONOMY LEARNING TE, V3rd
[4]  
Argamon S., 2003, TEXT, V23, P321, DOI [DOI 10.1515/TEXT.2003.014, 10.1515/text.2003.014]
[5]  
BACKMAN L, 1985, EXP AGING RES, V11, P67
[6]  
Barral C, 2009, LECT NOTES COMPUT SC, V5458, P57
[7]   Surrogate Decision Making in the Internet Age [J].
Berg, Jessica .
AMERICAN JOURNAL OF BIOETHICS, 2012, 12 (10) :28-33
[8]  
Brainard J., 2006, ACM C COMP COMM SEC, P168
[9]  
Conklin A., 2004, SYSTEM SCI
[10]  
Corbato ' F. J, 1990, ACM TURING AWARD LEC