Passphrase and keystroke dynamics authentication: Usable security

被引:29
作者
Bhana, Bhaveer [1 ]
Flowerday, Stephen [1 ]
机构
[1] Rhodes Univ, Dept Informat Syst, ZA-6140 Grahamstown, South Africa
关键词
Passphrase; Password; Keystroke dynamics; User authentication; Usability; Two-tier authentication; USABILITY; PASSWORD; CAPACITY;
D O I
10.1016/j.cose.2020.101925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It was found that employees spend a total of 2.25 days within 60 days on password-related activities. The time consumed by this is unproductive and has a negative impact on usability. The problem is caused by current text-based user authentication policies in use. This study aims to address this research problem by assessing the effectiveness of a proposed two-tier user authentication solution involving passphrases and keystroke dynamics. A design science research approach was used to guide this study, the theoretical foundation of which included three theories: the Shannon Entropy theory which was used to calculate the strength of passwords, passphrases and keystroke dynamics; Chunking theory assisted in assessing password and passphrase memorisation issues; and the Keystroke Level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. Firstly, a login assessment experiment was used to collect data on user authentication and user-system interaction for passwords and passphrases and, secondly, an expert review was conducted to validate findings and assess the research artefact in the form of a model. The model was finalised after it had been updated based on the expert review feedback. The model indicates the components that should be considered to implement the user authentication solution successfully. If all the model components are considered, the proposed two-tier user authentication solution has the potential to improve security and usability in the user authentication process. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 98 条
[1]  
Al-Megren S., 2018, MULTIMODAL TECHNOL I, V2, P1
[2]   On password behaviours and attitudes in different populations [J].
Alomari, Ruba ;
Thorpe, Julie .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :79-89
[3]  
[Anonymous], 2013, CHI 2013 HUM FACT CO, DOI DOI 10.1145/2468356.2468769
[4]  
[Anonymous], P WORLD ACAD SCI ENG
[5]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[6]  
Bhivgade T, 2014, Int J Comput Sci Informat Technol, V5, P1185
[7]   Both Complete and Correct? Multi-Objective Optimization of Touchscreen Keyboard [J].
Bi, Xiaojun ;
Ouyang, Tom ;
Zhai, Shumin .
32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, :2297-2306
[8]   What the App is That? Deception and Countermeasures in the Android User Interface [J].
Bianchi, Antonio ;
Corbetta, Jacopo ;
Invernizzi, Luca ;
Fratantonio, Yanick ;
Kruegel, Christopher ;
Vigna, Giovanni .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :931-948
[9]  
Binu S., 2020, SN Computer Science, V1, P1
[10]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567