Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

被引:3
作者
Adebimpe, Lateef Adekunle [1 ,2 ]
Ng, Ian Ouii [1 ]
Idris, Mohd Yamani Idna [1 ]
Okmi, Mohammed [1 ,3 ]
Ku, Chin Soon [4 ]
Ang, Tan Fong [1 ]
Por, Lip Yee [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Emmanuel Alayande Univ Educ, Dept Comp Sci, Oyo 211225, Nigeria
[3] Jazan Univ, Dept Informat Technol & Secur, Jazan 45142, Saudi Arabia
[4] Univ Tunku Abdul Rahman, Dept Comp Sci, Kampar 31900, Malaysia
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 18期
关键词
graphical password; authentication; recognition based; information security; shoulder surfing; GRAPHICAL PASSWORD; RESISTANT;
D O I
10.3390/app131810040
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim's actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the efficacy of recognition-based graphical password methods in countering shoulder-surfing attacks by analyzing the diverse strategies employed by these methods and revealing their strengths and weaknesses.
引用
收藏
页数:20
相关论文
共 53 条
[51]   Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks [J].
Wang, Ziqi ;
Liao, Lingzhi ;
Meng, Ruohan ;
Yang, Ching-Nung ;
Zhou, Zhili ;
Yang, Hengfu .
SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
[52]   Development Status and Prospects of Graphical Password Authentication System in Korea [J].
Yang, Gi-Chul .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11) :5755-5772
[53]   SHOULDER SURFING RESISTANCE USING PENUP EVENT AND NEIGHBOURING CONNECTIVITY MANIPULATION [J].
Yee, Por Lip ;
Kiah, Miss Laiha Mat .
MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2010, 23 (02) :121-140