GeoGraphical passwords

被引:1
|
作者
ZSS-Research, P.O.Box 16211, Ras Al Khaimah, United Arab Emirates [1 ]
机构
[1] ZSS-Research, Ras Al Khaimah
来源
Al-Salloum, Z.S. (zss@zss.net) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 09期
关键词
Access control; Access credential; Authentication; GeoGraphical passwords; Graphical passwords; Passwords;
D O I
10.1504/IJSN.2014.059330
中图分类号
学科分类号
摘要
It is indeed becoming more challenging for users to maintain different strong passwords for their ever increasing accounts. The lack of secure access credentials has recently led to the compromise of millions of users passwords stored in popular websites, due to guessing, dictionary, or brute force attacks. In this paper, we address the conventional password problem and propose a novel, simple, and practical access credential that would provide secure access to different entities and mitigate many vulnerabilities associated with current password based schemes. We name our proposal GeoGraphical passwords, which is an access credential based on geographical information. The credential utilise the remarkable human ability to remember places as a way to provide safe access, where users can select geographical locations (such as favourite places, mountains, trees, rivers or others) as their access credential to different systems. We develop a prototype to show one possible implementation of GeoGraphical passwords and improve the credential's ability to protect itself from common password threats in an attempt to mitigate the frequent risks associated with-the difficult to remember, construct, and maintain-conventional passwords. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:56 / 62
页数:6
相关论文
共 50 条
  • [21] Synthesis of Secure Passwords
    Sato, Tomoki
    Kikuchi, Hiroaki
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 35 - 43
  • [22] Passwords, Privacy, and Policies: Can They Do Business Together?
    Schaffer, Kim
    COMPUTER, 2013, 46 (12) : 76 - 79
  • [23] Optimal Discretization for High-Entropy Graphical Passwords
    Bicakci, Kemal
    23RD INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2008, : 48 - 53
  • [24] Getting past passwords
    Furnell, Steven
    Computer Fraud and Security, 2013, 2013 (04) : 8 - 13
  • [25] Exploiting predictability in click-based graphical passwords
    van Oorschot, P.
    Thorpe, Julie
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (04) : 669 - 702
  • [26] End to End Passwords
    Ruoti, Scott
    Seamons, Kent
    NEW SECURITY PARADIGMS WORKSHOP (NSPW 2017), 2017, : 107 - 121
  • [27] A Study of Mnemonic Image Passwords
    Chowdhury, Soumyadeb
    Poet, Ron
    Mackenzie, Lewis
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 207 - 214
  • [28] Visualizing Keyboard Pattern Passwords
    Schweitzer, Dino
    Boleng, Jeff
    Hughes, Colin
    Murphy, Louis
    6TH INTERNATIONAL WORKSHOP ON VISUALIZATION FOR CYBER SECURITY 2009, 2009, : 69 - 73
  • [29] Key distillation from passwords
    Liu Y.
    Liu S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 61 - 68
  • [30] USING PASSTONES INSTEAD OF PASSWORDS
    Brown, Mary
    Doswell, Felicia R.
    PROCEEDINGS OF THE 48TH ANNUAL SOUTHEAST REGIONAL CONFERENCE (ACM SE 10), 2010, : 408 - 412