GeoGraphical passwords

被引:1
|
作者
ZSS-Research, P.O.Box 16211, Ras Al Khaimah, United Arab Emirates [1 ]
机构
[1] ZSS-Research, Ras Al Khaimah
来源
Al-Salloum, Z.S. (zss@zss.net) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 09期
关键词
Access control; Access credential; Authentication; GeoGraphical passwords; Graphical passwords; Passwords;
D O I
10.1504/IJSN.2014.059330
中图分类号
学科分类号
摘要
It is indeed becoming more challenging for users to maintain different strong passwords for their ever increasing accounts. The lack of secure access credentials has recently led to the compromise of millions of users passwords stored in popular websites, due to guessing, dictionary, or brute force attacks. In this paper, we address the conventional password problem and propose a novel, simple, and practical access credential that would provide secure access to different entities and mitigate many vulnerabilities associated with current password based schemes. We name our proposal GeoGraphical passwords, which is an access credential based on geographical information. The credential utilise the remarkable human ability to remember places as a way to provide safe access, where users can select geographical locations (such as favourite places, mountains, trees, rivers or others) as their access credential to different systems. We develop a prototype to show one possible implementation of GeoGraphical passwords and improve the credential's ability to protect itself from common password threats in an attempt to mitigate the frequent risks associated with-the difficult to remember, construct, and maintain-conventional passwords. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:56 / 62
页数:6
相关论文
共 50 条
  • [31] Do Background Images Improve "Draw a Secret" Graphical Passwords?
    Dunphy, Paul
    Yan, Jeff
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 36 - 47
  • [32] Efficient and Secure Authenticated Key Exchange Using Weak Passwords
    Katz, Jonathan
    Ostrovsky, Rafail
    Yung, Moti
    JOURNAL OF THE ACM, 2009, 57 (01)
  • [33] A large-scale analysis of Wi-Fi passwords
    Veroni, Eleni
    Ntantogian, Christoforos
    Xenakis, Christos
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [34] A Comprehensive Study of Frequency, Interference, and Training of Multiple Graphical Passwords
    Everitt, Katherine M.
    Bragin, Tanya
    Fogarty, James
    Kohno, Tadayoshi
    CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, 2009, : 889 - 898
  • [35] The burden of keeping passwords secret
    Renaud K.
    Network Security, 2024, 2024 (06)
  • [36] An Innovative User Authentication Method: Replacements of Text Based Passwords
    Shukla, Varun
    Dixit, Shivani
    Kumar, Ravi
    Patidar, Manish
    INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 : 210 - 224
  • [37] Achieving Flatness: Selecting the Honeywords from Existing User Passwords
    Erguler, Imran
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 284 - 295
  • [38] Eye Tracking Graphical Passwords
    Mihajlov, Martin
    Jerman-Blazic, Borka
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 37 - 44
  • [39] Empirical keystroke analysis in passwords
    Montalvao, Jugurta
    Freire, Eduardo O.
    Bezerra, Murilo A., Jr.
    Garcia, Rodolfo
    5TH ISSNIP-IEEE BIOSIGNALS AND BIOROBOTICS CONFERENCE (2014): BIOSIGNALS AND ROBOTICS FOR BETTER AND SAFER LIVING, 2014, : 167 - 172
  • [40] Strengthening passwords by keystroke dynamics
    Meszaros, Attila
    Banko, Zoltan
    Czuni, Laszlo
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 574 - 577