MC

Current Trends in Science and Technology

an Open Access Publication ISSN: 0976-9730 | 0976-9498

Computer Science

Resisting Shoulder Surfing Attack Using Pass Matrix and Pair Base Techniques

Gawandi Mayuri K, Pokharkar Snehal M, Pate Saloni P., Prof. Said S. K
Department of computer enginnering Jaihind College of Engineering, Kuran Pune, India mayurigawandi25@gmail.com Department of computer enginnering Jaihind College of Engineering, Kuran Pune, India snehalpokharkar96@gmail.com Department of computer enginnering Jaihind College of Engineering, Kuran Pune, India salonipate.sp@gmail.com Department of computer enginnering Jaihind College of Engineering, Kuran Pune, India shubhangi28587@gmail.com
Online First: February 26, 2018
| Google Scholar

Abstract

Now a days India is moving towards a digital India while moving towards a digitization security is major concern. For providing security traditional authentication methods are used like credentials, OTP, LTP, etc. But there are major security threats while using this methods.


Web application and mobile application are used widely in everywhere with various devices. This evolution is very useful but also increases probability leaking a password through shoulder surfing attacks. In this attack, attacker can observe directly or by external recording devices or video capturing are used for collecting password. To overcome this we proposed a system that provides pair base method and graphical password based on pass matrix concept to resist shoulder surfing attack. Pass Matrix is considered a novel and easy-to-use graphical password authentication system, which can effectively improve shoulder-surfing attacks. In graphical password where users click on images to authenticate themselves. Experimental result show that, the proposed system achieves better resistance to shoulder surfing attacks while maintaining usability.

Keyword : Authentication,Graphical Passwords, PassMatrix, Shoulder Surfing.

  Submitted
Feb 26, 2018
Published
Feb 26, 2018
Abstract Views
156
PDF Downloads
38
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

References

[1]. A Shoulder Surfing Resistant Graphical Authentication System,Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and Chia-Yun Cheng,2016 [2]. Bin B.Zhu, Jeff Yan,Gunabo Bao,Maowei Yangand Ning Xu, “Captcha as Graphical Password-A new Security Approach Based on Hard AI Problems", IEEE,June 2014. [3]. David Kim, Paul Dunphy, and Pam Briggs, “A Shoulder Surfing Resistant Visual Authentication Scheme,” (Volume:PP , Issue: 99 ), April 10-15, 2010. [4]. R.Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012. [5]. R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4. [6]. J. Long and K. Mitnick, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Elsevier Science, 2011. [7]. T. Kwon, S. Shin, and S. Na, “Covert attentional shoulder surfing: Human adversaries are more powerful than expected,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6,pp. 716–727, June 2014. [8]. B. Hartanto, B. Santoso, and S. Welly, “The usage of graphical password as a replacement to the alphanumerical password,” Informatika, vol. 7, no. 2, 2006, pp. 91-97. [9]. S. Man, D. Hong, and M. Mathews, “A shoulder surfing resistant graphical password scheme,” Proc. of the 2003 Int.Conf. on Security and Management, June 2003, pp. 105-111 . [10]. “Realuser,” http://www.realuser.com/. [11]. Z. Zheng, X. Liu, L. Yin, and Z. Liu, “A stroke-based textual password authentication scheme,” Proc. of the FirstInt. Workshop.on Education Technology and ComputerScience, Mar. 2009, pp. 90-95. [12]. T. Yamamoto, Y. Kojima, and M. Nishigaki, “A shoulder surfing-resistant image-based authentication system with temporal indirect image selection,” Proc. of the 2009 Int.Conf. on Security and Management, July 2009, pp. 188- 194. [13]. H. Zhao and X. Li, “S3PAS: A scalable shoulder -surfing resistant textual-graphical password authentication scheme,” Proc. of 21st Int. Conf. on Advanced InformationNetworking and Applications Workshops, vol. 2, May 2007, pp. 467-472. [14]. AA. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier to recall than words?” Psychonomic Science, 1968. [15]. D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977. [16]. S. H. Kim, J. W. Kim, S. Y. Kim, and H.G. Cho. “A new shoulder-surfing resistant password for mobile environments,” Proc. of 5th Int. Conf. on Ubiquitous Information Management and Communication, Feb. 2011. [17].S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1–7.
Downloads

Downloads

Download data is not yet available.

References

[1]. A Shoulder Surfing Resistant Graphical Authentication System,Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh and Chia-Yun Cheng,2016
[2]. Bin B.Zhu, Jeff Yan,Gunabo Bao,Maowei Yangand Ning Xu, “Captcha as Graphical Password-A new Security Approach Based on Hard AI Problems", IEEE,June 2014.
[3]. David Kim, Paul Dunphy, and Pam Briggs, “A Shoulder Surfing Resistant Visual Authentication Scheme,” (Volume:PP , Issue: 99 ), April 10-15, 2010.
[4]. R.Biddle, S. Chiasson, and P. C. van Oorschot, “Graphical passwords: Learning from the first twelve years,” ACM Comput. Surveys, vol. 44, no. 4, 2012.
[5]. R. Dhamija and A. Perrig, “Deja vu: A user study using images for authentication,” in Proceedings of the 9th conference on USENIX Security Symposium-Volume 9. USENIX Association, 2000, pp. 4–4.
[6]. J. Long and K. Mitnick, No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Elsevier Science, 2011.
[7]. T. Kwon, S. Shin, and S. Na, “Covert attentional shoulder surfing: Human adversaries are more powerful than expected,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6,pp. 716–727, June 2014.
[8]. B. Hartanto, B. Santoso, and S. Welly, “The usage of graphical password as a replacement to the alphanumerical password,” Informatika, vol. 7, no. 2, 2006, pp. 91-97.
[9]. S. Man, D. Hong, and M. Mathews, “A shoulder surfing resistant graphical password scheme,” Proc. of the 2003 Int.Conf. on Security and Management, June 2003, pp. 105-111 .
[10]. “Realuser,” http://www.realuser.com/.
[11]. Z. Zheng, X. Liu, L. Yin, and Z. Liu, “A stroke-based textual password authentication scheme,” Proc. of the FirstInt. Workshop.on Education Technology and ComputerScience, Mar. 2009, pp. 90-95.
[12]. T. Yamamoto, Y. Kojima, and M. Nishigaki, “A shoulder surfing-resistant image-based authentication system with temporal indirect image selection,” Proc. of the 2009 Int.Conf. on Security and Management, July 2009, pp. 188- 194.
[13]. H. Zhao and X. Li, “S3PAS: A scalable shoulder -surfing resistant textual-graphical password authentication scheme,” Proc. of 21st Int. Conf. on Advanced InformationNetworking and Applications Workshops, vol. 2, May 2007, pp. 467-472.
[14]. AA. Paivio, T. Rogers, and P. Smythe, “Why are pictures easier to recall than words?” Psychonomic Science, 1968.
[15]. D. Nelson, U. Reed, and J. Walling, “Picture superiority effect,” Journal of Experimental Psychology: Human Learning and Memory, vol. 3, pp. 485–497, 1977.
[16]. S. H. Kim, J. W. Kim, S. Y. Kim, and H.G. Cho. “A new shoulder-surfing resistant password for mobile environments,” Proc. of 5th Int. Conf. on Ubiquitous Information Management and Communication, Feb. 2011.
[17].S. Sood, A. Sarje, and K. Singh, “Cryptanalysis of password authentication schemes: Current status and key issues,” in Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on, Dec 2009, pp. 1–7.
No Supplimentary Material available for this article.

Statistics from Altmetric.com

Statistics from Dimensions.ai

Statistics from PlumX


Related Articles

Related Authors

 



In Google Scholar

In International Journal of Current Trends in Science and Technology

In Google Scholar

 
  • Gawandi Mayuri K, Pokharkar Snehal M, Pate Saloni P., Prof. Said S. K

  • INDEXING AND ABSTRACTING