A New Shoulder Surfing and Mobile Key-Logging Resistant Graphical Password Scheme for Smart-Held Devices

被引:0
作者
Hanif, Sundas [1 ]
Sohail, Fahad [1 ]
Shehrbano [1 ]
Tariq, Aneeqa [1 ]
Babar, Muhammad Imran [1 ]
机构
[1] Army Publ Coll Management & Sci UET Taxila, Dept Comp Sci & Software Engn, Rawalpindi, Pakistan
关键词
Authentication; graphical password; shoulder surfing; mobile key-logging; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In globalization of information, internet has played a vital role by providing an easy and fast access of information and systems to remote users. However, with ease for authentic users, it has made information resources accessible to unauthorized users too. To authorize legitimate user for the access of information and systems, authentication mechanisms are applied. Many users use their credentials or private information at public places to access their accounts that are protected by passwords. These passwords are usually text-based passwords and their security and effectiveness can be compromised. An attacker can steal text-based passwords using different techniques like shoulder surfing and various key logger software, that are freely available over internet. To improve the security, numerous sophisticated and secure authentication systems have been proposed that employ various biometric authentication systems, token-based authentication system etc. But these solutions providing such high-level security, require special modification in the design and hence, imply additional cost. Textual passwords that are easy to use but vulnerable to attacks like shoulder surfing, various image based, and textual graphical password schemes are proposed. However, none of the existing textual graphical passwords are resistant to shoulder surfing and more importantly to mobile key-logging. In this paper, an improved and robust textual graphical password scheme is proposed that uses sectors and colors and introducing randomization as the primary function for the character display and selection. This property makes the proposed scheme resistant to shoulder surfing and more importantly to mobile key-logging. It can be useful for authentication process of any smart held device application.
引用
收藏
页码:432 / 437
页数:6
相关论文
共 20 条
  • [11] Mishra Ambey Raj, 2018, INT RES J ENG TECHNO, V5
  • [12] Pooja K S, 2015, INT J INFORM TECHNOL, V6
  • [13] Por L. Y., 2017, GRAPHICAL PASSWORD P
  • [14] Raut S.Y., 2014, INT J ADV RES COMPUT, V5
  • [15] RECOGNITION MEMORY FOR WORDS SENTENCES AND PICTURES
    SHEPARD, RN
    [J]. JOURNAL OF VERBAL LEARNING AND VERBAL BEHAVIOR, 1967, 6 (01): : 156 - +
  • [16] Suo X., 21 ANN COMP SEC APPL
  • [17] Wagh S. H., ICCT 2015 INT J COMP
  • [18] Wiedenbeck S., 2006, AVI 06
  • [19] Yang GC, 2018, J IMAGE GRAPHICS, V6
  • [20] Yang GC, 2017, 4 INT C COMP APPL IN