An Efficient Graphical Authentication System

Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta
{"title":"An Efficient Graphical Authentication System","authors":"Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta","doi":"10.51983/ajsat-2017.6.1.937","DOIUrl":null,"url":null,"abstract":"Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Science and Applied Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51983/ajsat-2017.6.1.937","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一个高效的图形认证系统
密码认证主要用于计算机安全和隐私方面的应用。然而,选择错误的密码和以不安全的方式输入密码等人为行为被认为是身份验证过程中“最薄弱的环节”。用户通常使用弱密码,而不是任意的字母数字字符串,更多的是基于他们的个人信息。随着新技术的出现和移动应用程序的堆积,用户可以随时随地在各种设备上使用该应用程序。虽然这种进化很方便,但它也增加了将密码暴露于肩部冲浪攻击的可能性。攻击者可以直接观察或使用外部记录设备收集用户凭证。为了克服这一问题,提出了一种新的基于图形密码的认证系统Pass Matrix,以抵抗肩冲浪攻击。通过一次性代码和覆盖整个通过图像范围的水平和垂直条,即使攻击者进行多次基于摄像头的攻击,也不会给攻击者提供任何提示来找出或缩小密码。我们将实现一个Pass Matrix原型,从实验结果来看,所提出的系统将在保持可用性的同时获得更好的抗肩冲浪攻击能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring Attentional Dynamics in Animated Programming Environments: Trajectories, Variability, and Predictors The Mythical Construction of the Spread of Lassa Fever among Garri Marketers: Empirical Evidence from Edo State, Nigeria Effect of Ethanolic and Chloroform Extracts of Lantana Camara Flowers on the Second Instar Stage of Anopheles Mosquito Larvae Rejuvenation of Pesticide Polluted Soil from the Isolated Microbial Flora of Agricultural Field Characterization of Tannery Effluent and Efficiency Assessment of Central Effluent Treatment Plant (CETP) at Savar in Bangladesh
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1