GeoGraphical passwords

被引:1
作者
ZSS-Research, P.O.Box 16211, Ras Al Khaimah, United Arab Emirates [1 ]
机构
[1] ZSS-Research, Ras Al Khaimah
来源
Al-Salloum, Z.S. (zss@zss.net) | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 09期
关键词
Access control; Access credential; Authentication; GeoGraphical passwords; Graphical passwords; Passwords;
D O I
10.1504/IJSN.2014.059330
中图分类号
学科分类号
摘要
It is indeed becoming more challenging for users to maintain different strong passwords for their ever increasing accounts. The lack of secure access credentials has recently led to the compromise of millions of users passwords stored in popular websites, due to guessing, dictionary, or brute force attacks. In this paper, we address the conventional password problem and propose a novel, simple, and practical access credential that would provide secure access to different entities and mitigate many vulnerabilities associated with current password based schemes. We name our proposal GeoGraphical passwords, which is an access credential based on geographical information. The credential utilise the remarkable human ability to remember places as a way to provide safe access, where users can select geographical locations (such as favourite places, mountains, trees, rivers or others) as their access credential to different systems. We develop a prototype to show one possible implementation of GeoGraphical passwords and improve the credential's ability to protect itself from common password threats in an attempt to mitigate the frequent risks associated with-the difficult to remember, construct, and maintain-conventional passwords. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:56 / 62
页数:6
相关论文
共 50 条
  • [41] System-Assigned Passwords: The Disadvantages of the Strict Password Management Policies
    Brumen, Bostjan
    INFORMATICA, 2020, 31 (03) : 459 - 479
  • [42] Concerns and Security for Hashing Passwords
    Herrera, Jonathan
    Ali, Md Liakat
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 861 - 865
  • [43] Query-directed passwords
    O'Gorman, L
    Bagga, A
    Bentley, J
    COMPUTERS & SECURITY, 2005, 24 (07) : 546 - 560
  • [44] "Passwords protect my stuff"-a study of children's password practices
    Choong, Yee-Yin
    Theofanos, Mary F.
    Renaud, Karen
    Prior, Suzanne
    JOURNAL OF CYBERSECURITY, 2019, 5 (01):
  • [45] A Research Agenda Acknowledging the Persistence of Passwords
    Herley, Cormac
    van Oorschot, Paul
    IEEE SECURITY & PRIVACY, 2012, 10 (01) : 28 - 36
  • [46] Examining the Strength of Three Word Passwords
    Fraser, William
    Broadbent, Matthew
    Pitropakis, Nikolaos
    Chrysoulas, Christos
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 119 - 133
  • [47] Using Image Saliency and Regions of Interest to Encourage Stronger Graphical Passwords
    Alshehri, Mohammad N.
    Crawford, Heather
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 127 - 138
  • [48] The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems
    Anastasiadi, Eva
    Athanasopoulos, Elias
    Markatos, Evangelos
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 560 - 567
  • [49] Authenticating passwords over an insecure channel
    Wu, TC
    Sung, HS
    COMPUTERS & SECURITY, 1996, 15 (05) : 431 - 439
  • [50] A study on priming methods for graphical passwords
    Parish Z.
    Salehi-Abari A.
    Thorpe J.
    Journal of Information Security and Applications, 2021, 62