Passphrase and keystroke dynamics authentication: Usable security

被引:26
作者
Bhana, Bhaveer [1 ]
Flowerday, Stephen [1 ]
机构
[1] Rhodes Univ, Dept Informat Syst, ZA-6140 Grahamstown, South Africa
关键词
Passphrase; Password; Keystroke dynamics; User authentication; Usability; Two-tier authentication; USABILITY; PASSWORD; CAPACITY;
D O I
10.1016/j.cose.2020.101925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It was found that employees spend a total of 2.25 days within 60 days on password-related activities. The time consumed by this is unproductive and has a negative impact on usability. The problem is caused by current text-based user authentication policies in use. This study aims to address this research problem by assessing the effectiveness of a proposed two-tier user authentication solution involving passphrases and keystroke dynamics. A design science research approach was used to guide this study, the theoretical foundation of which included three theories: the Shannon Entropy theory which was used to calculate the strength of passwords, passphrases and keystroke dynamics; Chunking theory assisted in assessing password and passphrase memorisation issues; and the Keystroke Level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. Firstly, a login assessment experiment was used to collect data on user authentication and user-system interaction for passwords and passphrases and, secondly, an expert review was conducted to validate findings and assess the research artefact in the form of a model. The model was finalised after it had been updated based on the expert review feedback. The model indicates the components that should be considered to implement the user authentication solution successfully. If all the model components are considered, the proposed two-tier user authentication solution has the potential to improve security and usability in the user authentication process. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 98 条
  • [1] Al-Megren S., 2018, MULTIMODAL TECHNOL I, V2, P1
  • [2] On password behaviours and attitudes in different populations
    Alomari, Ruba
    Thorpe, Julie
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 79 - 89
  • [3] [Anonymous], P WORLD ACAD SCI ENG
  • [4] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    [J]. JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [5] Bhivgade T, 2014, Int J Comput Sci Informat Technol, V5, P1185
  • [6] Both Complete and Correct? Multi-Objective Optimization of Touchscreen Keyboard
    Bi, Xiaojun
    Ouyang, Tom
    Zhai, Shumin
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 2297 - 2306
  • [7] What the App is That? Deception and Countermeasures in the Android User Interface
    Bianchi, Antonio
    Corbetta, Jacopo
    Invernizzi, Luca
    Fratantonio, Yanick
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 931 - 948
  • [8] Binu S., 2020, SN Computer Science, V1, P1
  • [9] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [10] Boulgouris N.V., 2010, Biometrics: Theory, Methods, and Applications