A New Shoulder Surfing and Mobile Key-Logging Resistant Graphical Password Scheme for Smart-Held Devices

被引:0
作者
Hanif, Sundas [1 ]
Sohail, Fahad [1 ]
Shehrbano [1 ]
Tariq, Aneeqa [1 ]
Babar, Muhammad Imran [1 ]
机构
[1] Army Publ Coll Management & Sci UET Taxila, Dept Comp Sci & Software Engn, Rawalpindi, Pakistan
关键词
Authentication; graphical password; shoulder surfing; mobile key-logging; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In globalization of information, internet has played a vital role by providing an easy and fast access of information and systems to remote users. However, with ease for authentic users, it has made information resources accessible to unauthorized users too. To authorize legitimate user for the access of information and systems, authentication mechanisms are applied. Many users use their credentials or private information at public places to access their accounts that are protected by passwords. These passwords are usually text-based passwords and their security and effectiveness can be compromised. An attacker can steal text-based passwords using different techniques like shoulder surfing and various key logger software, that are freely available over internet. To improve the security, numerous sophisticated and secure authentication systems have been proposed that employ various biometric authentication systems, token-based authentication system etc. But these solutions providing such high-level security, require special modification in the design and hence, imply additional cost. Textual passwords that are easy to use but vulnerable to attacks like shoulder surfing, various image based, and textual graphical password schemes are proposed. However, none of the existing textual graphical passwords are resistant to shoulder surfing and more importantly to mobile key-logging. In this paper, an improved and robust textual graphical password scheme is proposed that uses sectors and colors and introducing randomization as the primary function for the character display and selection. This property makes the proposed scheme resistant to shoulder surfing and more importantly to mobile key-logging. It can be useful for authentication process of any smart held device application.
引用
收藏
页码:432 / 437
页数:6
相关论文
共 20 条
  • [1] Ahmad A., 2016, INT J COMPUTER NETWO
  • [2] [Anonymous], 2012, WORLD APPL SCI J, DOI DOI 10.5829/idosi.wasj.2012.19.04.1837
  • [3] Darbanian E., 2015, INT S COMP SCI SOFTW
  • [4] Eastlake D., 2001, US Secure Hash Algorithm, V1
  • [5] Gao H., 2009, 4 INT C INN COMP INF
  • [6] The Shoulder Surfing Resistant Graphical Password Authentication Technique
    Gokhale, Aakansha S.
    Waghmare, Vijaya S.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 490 - 498
  • [7] Higashiyama Y., 2015, 3 INT S COMP NETW CA
  • [8] Irfan K., 2018, 15 INT C APPL SCI TE
  • [9] KIRKPATRICK E.A., 1894, PSYCHOL REV, V1, P602, DOI DOI 10.1037/H0068244
  • [10] Lashkari A. H., 2011, 11 INT C COMP INF TE