Geographical Security Questions for Fallback Authentication

被引:4
|
作者
Addas, Alaadin [1 ]
Salehi-Abari, Amirali [1 ]
Thorpe, Julie [1 ]
机构
[1] Ontario Tech Univ, Oshawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
PURELY AUTOMATED ATTACKS; PASSPOINTS;
D O I
10.1109/pst47121.2019.8949063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fallback authentication is the backup authentication method used when the primary authentication method (e.g., passwords, biometrics, etc.) fails. Currently, widely-deployed fallback authentication methods (e.g., security questions, email resets, and SMS resets) suffer from documented security and usability flaws that threaten the security of accounts. These flaws motivate us to design and study Geographical Security Questions (GeoSQ), a system for fallback authentication. GeoSQ is an Android application that utilizes autobiographical location data for fallback authentication. We performed security and usability analyses of GeoSQ through an in-person two-session lab study (n=36, 18 pairs). Our results indicate that GeoSQ exceeds the security of its counterparts, while its usability (specifically login time and memorability) has room for improvement.
引用
收藏
页码:217 / 222
页数:6
相关论文
共 50 条
  • [41] OGSA security authentication services
    Xie, HX
    Meng, FR
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 996 - 999
  • [42] Usability versus security of authentication
    Hub, Miloslav
    Capek, Jan
    Myskova, Renata
    Roudny, Radim
    COMMUNICATION AND MANAGEMENT IN TECHNOLOGICAL INNOVATION AND ACADEMIC GLOBALIZATION, 2010, : 34 - 38
  • [43] Security and authentication in the mobile world
    Ojanperä, T
    Mononen, R
    WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 229 - 235
  • [44] Remote authentication with forward security
    Chai, Zhenchuan
    Cao, Zhenfu
    Lu, Rongxing
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 418 - 427
  • [45] Key Authentication for MANET Security
    Kumar, Vijay
    Sharma, Rakesh
    Kush, Ashwani
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 497 - +
  • [46] Anonymous authentication: For privacy and security
    Sako, Kazue
    Yonezawa, Shoko
    Teranishi, Isamu
    NEC Journal of Advanced Technology, 2005, 2 (01): : 79 - 83
  • [47] Security: Active Authentication INTRODUCTION
    Guidorizzi, Richard P.
    IT PROFESSIONAL, 2013, 15 (04) : 4 - 7
  • [48] Security Analysis of TLS Authentication
    Ranjan, Aditya Kaushal
    Kumar, Vijay
    Hussain, Muzzammil
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1356 - 1360
  • [49] On the security of the Tor authentication protocol
    Goldberg, Ian
    Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [50] Geographical origin authentication of honey produced in Argentina
    Fechner, Diana C.
    Hidalgo, Melisa J.
    Ruiz Diaz, Juan D.
    Gil, Raul A.
    Pellerano, Roberto G.
    FOOD BIOSCIENCE, 2020, 33