SHOULDER SURFING RESISTANCE USING PENUP EVENT AND NEIGHBOURING CONNECTIVITY MANIPULATION

被引:12
作者
Yee, Por Lip [1 ]
Kiah, Miss Laiha Mat [1 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
Picture-Based Password; Graphical Authentication; Shoulder Surfing; Drawmetric; Background Pass-Go;
D O I
10.22452/mjcs.vol23no2.5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Picture-based password has been proposed as an alternative authentication method to replace text-based password. Ensuring the security of picture-based password is not a simple task as picture-based objects are a lot easier to access and remember and can thus be easily guessed. In particular, shoulder surfing attack still remains as the main security threat encountered by many picture-based password authentication schemes, especially in drawmetric authentication scheme. In this paper, a novel shoulder surfing resistance mechanism has been proposed and evaluated. The proposed mechanism utilises penup event and neighbouring connectivity manipulation into a revised Background Pass-Go scheme. From the evaluation result, it has proven that the proposed mechanism achieves better results in resisting shoulder surfing attack while, at the same time, allowing a larger password space.
引用
收藏
页码:121 / 140
页数:20
相关论文
共 29 条
[1]  
Bishop M., 1991, COMPCON Spring '91. Digest of Papers (Cat. No.91CH2961-1), P167, DOI 10.1109/CMPCON.1991.128801
[2]  
BISHOP M, 1991, P 3 WORKSH COMP INC
[3]  
BISHOP M, 1990, P 2 WORKSH COMP SEC
[4]  
Brostoff S, 2000, BCS CONFERENCE S, P405
[5]  
CARLTON SF, 1988, 11 NAT COMP SEC C P, P333
[6]  
CHAKRABARTI S, 2007, P 4 IASTED AS C COMM, P561
[7]  
CHALKIAS K, 2006, P 6 INT C ART INT DI, P80
[8]   Is a picture really worth a thousand words? Exploring the feasibility of graphical authentication systems [J].
De Angeli, A ;
Coventry, L ;
Johnson, G ;
Renaud, K .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2005, 63 (1-2) :128-152
[9]  
Dirik AhmetEmir., 2007, Proceedings of the 3rd symposium on Usable privacy and security, P20
[10]  
Dunphy P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P36