Passphrase and keystroke dynamics authentication: Usable security

被引:26
作者
Bhana, Bhaveer [1 ]
Flowerday, Stephen [1 ]
机构
[1] Rhodes Univ, Dept Informat Syst, ZA-6140 Grahamstown, South Africa
关键词
Passphrase; Password; Keystroke dynamics; User authentication; Usability; Two-tier authentication; USABILITY; PASSWORD; CAPACITY;
D O I
10.1016/j.cose.2020.101925
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It was found that employees spend a total of 2.25 days within 60 days on password-related activities. The time consumed by this is unproductive and has a negative impact on usability. The problem is caused by current text-based user authentication policies in use. This study aims to address this research problem by assessing the effectiveness of a proposed two-tier user authentication solution involving passphrases and keystroke dynamics. A design science research approach was used to guide this study, the theoretical foundation of which included three theories: the Shannon Entropy theory which was used to calculate the strength of passwords, passphrases and keystroke dynamics; Chunking theory assisted in assessing password and passphrase memorisation issues; and the Keystroke Level model was used to assess password and passphrase typing issues. Two primary data collection methods were used to evaluate the findings and to ensure that gaps in the research were filled. Firstly, a login assessment experiment was used to collect data on user authentication and user-system interaction for passwords and passphrases and, secondly, an expert review was conducted to validate findings and assess the research artefact in the form of a model. The model was finalised after it had been updated based on the expert review feedback. The model indicates the components that should be considered to implement the user authentication solution successfully. If all the model components are considered, the proposed two-tier user authentication solution has the potential to improve security and usability in the user authentication process. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 98 条
  • [21] Outcomes following childhood arterial ischaemic stroke: A Delphi Consensus on what parents want from future research
    Edwards, Hannah
    Dunlop, Melissa
    Mallick, Andrew
    O'Callaghan, Finbar
    [J]. EUROPEAN JOURNAL OF PAEDIATRIC NEUROLOGY, 2015, 19 (02) : 181 - 187
  • [22] Etikan I., 2017, Biometrics & Biostatistics International Journal, V5, P215, DOI [DOI 10.15406/BBIJ.2017.05.00149, 10.15406/bbij.2017.05.00149]
  • [23] Feng T., 2014, P 15 WORKSH MOB COMP, P9, DOI DOI 10.1145/2565585.2565592
  • [24] Binary Discriminant Analysis for Generating Binary Face Template
    Feng, Yi C.
    Yuen, Pong C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 613 - 624
  • [25] Ganesh H., 2020, UGC CARE J, V40, P363
  • [26] A Review on Various Biometric Techniques, Its Features, Methods, Security Issues and Application Areas
    Gayathri, M.
    Malathy, C.
    Prabhakaran, M.
    [J]. COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING, 2020, 1108 : 931 - 941
  • [27] Geng TM, 2019, 2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), P1
  • [28] Combining mouse and keyboard events with higher level desktop actions to detect mild cognitive impairment
    Gledson, Ann
    Asfiandy, Dommy
    Mellor, Joseph
    Ba-Dhfari, Thamer Omer Faraj
    Stringert, Gemma
    Coutht, Samuel
    Burnst, Alistair
    Leroit, Iracema
    Zeng, Xiaojun
    Keane, John
    Bull, Christopher
    Rayson, Paul
    Sutcliffe, Alistair
    Sawyer, Peter
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI), 2016, : 139 - 145
  • [29] Green P, 1999, HUM FAC ERG SOC P, P987
  • [30] Greene K.K., 2016, Measuring the usability and security of permuted passwords on mobile platforms