Geographical Security Questions for Fallback Authentication

被引:4
|
作者
Addas, Alaadin [1 ]
Salehi-Abari, Amirali [1 ]
Thorpe, Julie [1 ]
机构
[1] Ontario Tech Univ, Oshawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
PURELY AUTOMATED ATTACKS; PASSPOINTS;
D O I
10.1109/pst47121.2019.8949063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fallback authentication is the backup authentication method used when the primary authentication method (e.g., passwords, biometrics, etc.) fails. Currently, widely-deployed fallback authentication methods (e.g., security questions, email resets, and SMS resets) suffer from documented security and usability flaws that threaten the security of accounts. These flaws motivate us to design and study Geographical Security Questions (GeoSQ), a system for fallback authentication. GeoSQ is an Android application that utilizes autobiographical location data for fallback authentication. We performed security and usability analyses of GeoSQ through an in-person two-session lab study (n=36, 18 pairs). Our results indicate that GeoSQ exceeds the security of its counterparts, while its usability (specifically login time and memorability) has room for improvement.
引用
收藏
页码:217 / 222
页数:6
相关论文
共 50 条
  • [21] Biometric authentication -: Security and usability
    Matyas, V
    Ríha, Z
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 227 - 239
  • [22] Mechatronic Security and Robot Authentication
    Adi, Wael
    2009 SYMPOSIUM ON BIO-INSPIRED LEARNING AND INTELLIGENT SYSTEMS FOR SECURITY (BLISS 2009), 2009, : 77 - 82
  • [23] Guarantee of authentication protocol security
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    Shanghai Jiaotong Daxue Xuebao, 2008, 4 (518-522):
  • [24] Biometric authentication in infrastructure security
    Armington, J
    Ho, P
    Koznek, P
    Martinez, R
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 1 - 18
  • [25] PASSWORDS: PHILOLOGY, SECURITY, AUTHENTICATION
    Baetens, Jan
    LEONARDO, 2019, 52 (02) : 205 - 206
  • [26] The Realization of the RADIUS Security Authentication
    Luo, Xiao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4782 - 4785
  • [27] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [28] Passwords: Philology, Security, Authentication
    Jackson, Mitch K.
    SURVEILLANCE & SOCIETY, 2021, 19 (02) : 279 - 281
  • [29] Passwords: Philology, Security, Authentication
    Dillon, Michael
    SYMPLOKE, 2020, 28 (1-2) : 596 - 598
  • [30] Security and Authentication in the Mobile World
    Tero Ojanperä
    Risto Mononen
    Wireless Personal Communications, 2002, 22 : 229 - 235