A systematic review of PIN-entry methods resistant to shoulder-surfing attacks

被引:25
作者
Binbeshr, Farid [1 ,3 ]
Kiah, M. L. Mat [1 ]
Por, Lip Yee [1 ]
Zaidan, A. A. [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Sultan Idris Univ Educ UPSI, Dept Comp, Tanjong Malim, Malaysia
[3] Hadhramout Univ, Al Mukalla 50512, Hadhramout, Yemen
关键词
PIN; Password; Shoulder surfing; Recording attack; Observation attack; Authentication; SECURITY;
D O I
10.1016/j.cose.2020.102116
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although conventional PIN-entry methods are widely used in many daily authentication procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry methods have been proposed in the literature to mitigate such attacks. Unfortunately, none of these methods is capable of replacing the conventional PIN-entry method. This study presents the results of a systematic review of PIN-entry methods resistant to shoulder-surfing attacks so that the main challenges that impede their adoption can be provided along with opportunities for future research. A systematic search was conducted on seven databases using predefined criteria. A test-retest approach was performed by a single author to extract data. A total of 55 articles were included in this review. The review results manifest that PIN-entry methods are classified mainly into direct and indirect inputs. The user study was the standard research method, and error rate and PIN-entry time were the most frequently adopted usability measures. The review argues that a recording-based shoulder-surfing attack is a major threat to PIN-entry methods. Error rate and PIN-entry time are widely adopted criteria for usability. The review indicates that most PIN-entry methods require a high error rate and PIN-entry time than the conventional method. Moreover, the lack of a standard evaluation framework should be addressed. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 66 条
[1]  
Adithya P, 2017, 2017 INT C INT COMP, P1
[2]   PathWord: A Multimodal Password Entry Method for Ad-hoc Authentication Based on Digit Shape and Smooth Pursuit Eye Movements [J].
Almoctar, Hassoumi ;
Irani, Pourang ;
Peysakhovich, Vsevolod ;
Hurter, Chrisophe .
ICMI'18: PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION, 2018, :268-277
[3]  
Alsuhibany SA, 2016, INT J COMPUT SCI INF, V14, P328
[4]  
[Anonymous], 2019, INT J ENG ADV TECHNO
[5]  
[Anonymous], 2018, CASP qualitative checklists
[6]  
[Anonymous], 2020, IRAN CONF ELECTR ENG, DOI DOI 10.1109/icee50131.2020.9260803
[7]  
[Anonymous], 2001, Advances in Cryptology-ASIACRYPT 2001, DOI [DOI 10.1007/3-540-45682-14, DOI 10.1007/3-540-45682-1]
[8]  
Aris H, 2018, 2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), P7, DOI 10.1109/AINS.2018.8631419
[9]   A survey on smartphone user's security choices, awareness and education [J].
Breitinger, Frank ;
Tully-Doyle, Ryan ;
Hassenfeldt, Courtney .
COMPUTERS & SECURITY, 2020, 88
[10]   PursuitPass: A Visual Pursuit-Based User Authentication System [J].
Carneiro, Alex Torquato S. ;
Elmadjian, Carlos Eduardo L. ;
Gonzales, Candy ;
Coutinho, Flavio L. ;
Morimoto, Carlos H. .
2019 32ND SIBGRAPI CONFERENCE ON GRAPHICS, PATTERNS AND IMAGES (SIBGRAPI), 2019, :226-233