Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

被引:3
作者
Adebimpe, Lateef Adekunle [1 ,2 ]
Ng, Ian Ouii [1 ]
Idris, Mohd Yamani Idna [1 ]
Okmi, Mohammed [1 ,3 ]
Ku, Chin Soon [4 ]
Ang, Tan Fong [1 ]
Por, Lip Yee [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Emmanuel Alayande Univ Educ, Dept Comp Sci, Oyo 211225, Nigeria
[3] Jazan Univ, Dept Informat Technol & Secur, Jazan 45142, Saudi Arabia
[4] Univ Tunku Abdul Rahman, Dept Comp Sci, Kampar 31900, Malaysia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 18期
关键词
graphical password; authentication; recognition based; information security; shoulder surfing; GRAPHICAL PASSWORD; RESISTANT;
D O I
10.3390/app131810040
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim's actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the efficacy of recognition-based graphical password methods in countering shoulder-surfing attacks by analyzing the diverse strategies employed by these methods and revealing their strengths and weaknesses.
引用
收藏
页数:20
相关论文
共 53 条
[1]  
Adamu H., 2022, P 2022 IEEE NIG 4 IN, P1
[2]   Secure multi-factor access control mechanism for pairing blockchains [J].
Addobea, Abigail Akosua ;
Li, Qianmu ;
Obiri, Isaac Amankona ;
Hou, Jun .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
[3]  
Sharna SA, 2022, Arxiv, DOI arXiv:2205.12352
[4]   Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues [J].
Al-Ameen, Mahdi Nasrullah ;
Wright, Matthew ;
Scielzo, Shannon .
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, :2315-2324
[5]  
Alfard Faheemah Mohammed, 2021, 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, P299, DOI 10.1109/MI-STA52233.2021.9464390
[6]   Graphical One-Time Password (GOTPass): A usability evaluation [J].
Alsaiari, Hussain ;
Papadaki, Maria ;
Dowland, Paul ;
Furnell, Steven .
INFORMATION SECURITY JOURNAL, 2016, 25 (1-3) :94-108
[7]  
ALSaleem B.O., 2021, P 2021 NAT COMP COLL
[8]  
[Anonymous], Authentication in an Internet Banking Environment
[9]  
[Anonymous], Authentication: Wikipedia
[10]   A systematic review of PIN-entry methods resistant to shoulder-surfing attacks [J].
Binbeshr, Farid ;
Kiah, M. L. Mat ;
Por, Lip Yee ;
Zaidan, A. A. .
COMPUTERS & SECURITY, 2021, 101