A new shoulder surfing and mobile key-logging resistant graphical password scheme for smart-held devices

被引:0
作者
Hanif S. [1 ]
Sohail F. [1 ]
Shehrbano [1 ]
Tariq A. [1 ]
Babar M.I. [1 ]
机构
[1] Department of Computer Science and Software Engineering, Army Public College of Management and Sciences, UET, Taxila
来源
International Journal of Advanced Computer Science and Applications | 2019年 / 10卷 / 09期
关键词
Authentication; Graphical password; Mobile key-logging; Security; Shoulder surfing;
D O I
10.14569/ijacsa.2019.0100957
中图分类号
学科分类号
摘要
In globalization of information, internet has played a vital role by providing an easy and fast access of information and systems to remote users. However, with ease for authentic users, it has made information resources accessible to unauthorized users too. To authorize legitimate user for the access of information and systems, authentication mechanisms are applied. Many users use their credentials or private information at public places to access their accounts that are protected by passwords. These passwords are usually text-based passwords and their security and effectiveness can be compromised. An attacker can steal text-based passwords using different techniques like shoulder surfing and various key logger software, that are freely available over internet. To improve the security, numerous sophisticated and secure authentication systems have been proposed that employ various biometric authentication systems, token-based authentication system etc. But these solutions providing such high-level security, require special modification in the design and hence, imply additional cost. Textual passwords that are easy to use but vulnerable to attacks like shoulder surfing, various image based, and textual graphical password schemes are proposed. However, none of the existing textual graphical passwords are resistant to shoulder surfing and more importantly to mobile key-logging. In this paper, an improved and robust textual graphical password scheme is proposed that uses sectors and colors and introducing randomization as the primary function for the character display and selection. This property makes the proposed scheme resistant to shoulder surfing and more importantly to mobile key-logging. It can be useful for authentication process of any smart held device application. © 2018 The Science and Information (SAI) Organization Limited.
引用
收藏
页码:432 / 437
页数:5
相关论文
共 20 条
  • [1] Wagh S.H., Ambekar A.G., Shoulder Surfing Resistant Text-based Graphical Password Scheme, ICCT 2015, International Journal of Computer Applications (0975-8887)
  • [2] Gokhalea A.S., Waghmare V.S., The Shoulder Surfing Resistant Graphical Password Authentication Technique, 7th International Conference on Communication, Computing and Virtualization 2016, Procedia Computer Science, 79, pp. 490-498, (2016)
  • [3] Suo X., Zhu Y., Scott Owen G., Graphical Passwords: A Survey, Department of Computer Science Georgia State University. 21st Annual Computer Security Applications Conference (ACSAC'05)
  • [4] An experimental study of memory, Psychological Review, 1, pp. 602-609, (1894)
  • [5] Shepard R., Recognition memory for words, sentences and pictures, Journal of Verbal Learning and Verbal Behavior, 6, pp. 156-163, (1967)
  • [6] Mishra A., Jadhav R., Patil S., A Shoulder-Surfing Resistant Graphical Password System, International Research Journal of Engineering and Technology (IRJET), 5, (2018)
  • [7] Prof Raut S.Y., Baviskar J.B., Rahul S.K., Aditya N.S., Yogesh S.S., Shoulder Surfing and Keylogger Resistant using Graphical Password Scheme, International Journal of Advanced Research in Computer Science, 5, 8, (2014)
  • [8] Pooja K.S., Dhooli P.V., Prathvi Ashwini N., Shoulder Surfing Resistance Using Graphical Password Authentication in Atm Systems, International Journal of Information Technology & Management Information System (IJITMIS), 6, 1, pp. 01-10, (2015)
  • [9] Wiedenbeck S., Waters J., Sobrado L., Birget J.C., Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme, AVI '06, (2006)
  • [10] Gao H., Liu X., Dai R., Wang S., Liu H., Design and Analysis of a Graphical Password Scheme, Fourth International Conference on Innovative Computing, Information and Control, (2009)