Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality

被引:1
作者
Wang, Jiawei [1 ,2 ]
Gao, BoYu [2 ,3 ,7 ,8 ]
Tu, Huawei [4 ]
Liang, Hai-Ning [5 ]
Liu, Zitao [3 ,6 ]
Luo, Weiqi [2 ,3 ]
Weng, Jian [2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
[2] Jinan Univ, Coll Cyber Secur, Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[3] Jinan Univ, Guangdong Inst Smart Educ, Guangzhou, Peoples R China
[4] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Australia
[5] Xian Jiaotong Liverpool Univ, Dept Comp, Suzhou, Peoples R China
[6] TAL Educ Grp, Beijing, Peoples R China
[7] Jinan Univ, Coll Cyber Secur, Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[8] Jinan Univ, Guangdong Inst Smart Educ, Guangzhou, Peoples R China
基金
国家重点研发计划;
关键词
Virtual reality; knowledge-based authentication; man-in-the-room attack;
D O I
10.1080/10447318.2023.2217608
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As Virtual Reality (VR) applications gain popularity, the need for a secure, usable, and memorable user authentication method becomes crucial. However, security and privacy in such VR applications are often ignored. Current methods are insufficient in preventing man-in-the-room (MITR) attacks, which allow attackers to observe user interactions in VR while remaining invisible, and inputted passwords can easily be stolen. In this study, we propose a dynamic combination of multi-attribute authentication methods for VR, where various 3D objects and their attributes can be created and displayed. Users must select combinations of 3D objects and their attributes provided by our designed principles for identity authentication. We explore the impact of method parameters on security and provide three specific parameter schemes to deploy the practical authentication system. We designed three user studies to evaluate the usability, security, and memorability of our authentication system. The results show that the proposed scheme can effectively resist both shoulder surfing and MITR attacks with unsuccessful attack rates of 100% and 95.83%, respectively. Furthermore, this research provides suggestions to secure VR applications while maintaining usability and enhancing the memorability of the authentication method.
引用
收藏
页码:4608 / 4626
页数:19
相关论文
共 63 条
[1]   CueVR: Studying the Usability of Cue-based Authentication for Virtual Reality [J].
Abdelrahman, Yomna ;
Mathis, Florian ;
Knierim, Pascal ;
Kettler, Axel ;
Alt, Florian ;
Khamis, Mohamed .
PROCEEDINGS OF THE WORKING CONFERENCE ON ADVANCED VISUAL INTERFACES AVI 2022, 2022,
[2]   Combining Pairwise Feature Matches from Device Trajectories for Biometric Authentication in Virtual Reality Environments [J].
Ajit, Ashwin ;
Banerjee, Natasha Kholgade ;
Banerjee, Sean .
2019 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND VIRTUAL REALITY (AIVR), 2019, :9-16
[3]  
Asish S M., 2022, Virtual Worlds, V1, P42
[4]  
Bhanushali A., 2015, International Journal of Computer Applications, V116, P11, DOI [10.5120/20299-2332, DOI 10.5120/20299-2332]
[5]   On Benchmarking Iris Recognition within a Head-mounted Display for AR/VR Applications [J].
Boutros, Fadi ;
Damer, Naser ;
Raja, Kiran ;
Ramachandra, Raghavendra ;
Kirchbuchner, Florian ;
Kuijper, Arjan .
IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2020), 2020,
[6]   Immersive Virtual Reality Attacks and the Human Joystick [J].
Casey, Peter ;
Baggili, Ibrahim ;
Yarramreddy, Ananya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :550-562
[7]   Sensor-Assisted Facial Recognition: An Enhanced Biometric Authentication System for Smartphones [J].
Chen, Shaxun ;
Pande, Amit ;
Mohapatra, Prasant .
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2014, :109-122
[8]  
Clancy T.Ch., 2003, P 2003 ACM SIGMM WOR, P45, DOI [DOI 10.1145/982507.982516, 10.1145/982507.982516]
[9]  
Erbetta, 2000, P IEEE C VIS BIOM
[10]  
Funk Markus., 2019, Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, P1