Preview

Improving user authentication on mobile devices:

Powerful Essays
Open Document
Open Document
3076 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Improving user authentication on mobile devices:
Improving user authentication on mobile devices:
A Touchscreen Graphical Password
Summary By: Quaniesha H
December 12, 2013

Abstract
We analyze three biometric verification modalities – voice, face and motion – and in addition secret word passage, on a portable gadget, to investigate the relative requests on client time, exertion, blunder and errand interruption. Our research center study furnished perceptions of client movements, techniques, and responses to the validation strategies. Face and voice biometrics conditions were speedier than watchword passage. Talking a Pin was the speediest for biometric specimen entrance, yet fleeting memory review was better in the face check condition. None of the confirmation conditions were recognized exceptionally usable. In conditions that consolidated two biometric entrance routines, the opportunity to get the biometric examples was shorter than if obtained independently yet they were extremely disliked and had high memory assignment blunder rates. These quantitative effects exhibit cognitive and engine contrasts between biometric verification modalities, and brief strategy choices in selecting confirmation. Typing text passwords is challenging when using touchscreens on mobile devices and this is becoming more problematic as mobile usage increases. They designed a new graphical password scheme called Touchscreen Multi-layered Drawing specifically for use with touchscreens. They conducted an exploratory user study of three existing graphical passwords on smart phones and tablets with 31 users. From this, they set the design goals for TMD to include addressing input accuracy issues without having to memorize images, while maintaining an appropriately secure password space. Design features include warp cells which allow TMD users to continuously draw their passwords across multiple layers in order to create more complex passwords than normally possible on a small screen.
Introduction
Versatile



References: 1.Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. Smudge attacks on smartphone touch screens. In USENIX Conference on Offensive Technologies (WOOT) (2010). 2.Bao, P., Pierce, J., Whittaker, S., and Zhai, S. Smart phone use by non-mobile business users. In ACM MobileHCI (2011). 3.Biddle, R., Chiasson, S., and Van Oorschot, P. Graphical passwords: Learning from the first twelve years. ACM Computing Survey 44, 4 (Sept. 2012), 19:1--19:41. 4.Chiasson, S., Forget, A., Biddle, R., and van Oorschot, P. C. Influencing users towards better passwords: Persuasive Cued Click-Points. In British HCI Annual Conference (BCS-HCI) (2008). 5.Dunphy, P., Heiner, A. P., and Asokan, N. A closer look at recognition-based graphical passwords on mobile devices. In ACM Symposium on Usable Privacy and Security (SOUPS) (2010). 6.Dunphy, P., and Yan, J. Do background images improve "Draw a Secret" graphical passwords? In ACM Computer and Communications Security (CCS) (2007). 7.Florencio, D., Herley, C., and Coskun, B. Do strong web passwords accomplish anything? In USENIX Workshop on Hot Topics in Security (HOTSEC) (2007), 1--6. 8.Henze, N., Rukzio, E., and Boll, S. 100,000,000 taps: analysis and improvement of touch performance in the large. In ACM MobileHCI (2011). 9.Hlywa, M., Biddle, R., and Patrick, A. S. Facing the facts about image type in recognition-based graphical passwords. In Annual Computer Security Applications Conference (ACSAC) (2011). 10.Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., and Rubin, A. The design and analysis of graphical passwords. In USENIX Security Symposium (1999). 11.Lee, S., and Zhai, S. The performance of touch screen soft buttons. In Proceedings of the 27th international conference on Human factors in computing systems, CHI '09, ACM (New York, NY, USA, 2009), 309--318. 13.Sae-Bae, N., Ahmed, K., Isbister, K., and Memon, N. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In ACM CHI (2012). 14.Schaub, F., Deyhle, R., and Weber, M. Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In ACM Conference on Mobile and Ubiquitous Multimedia (MUM) (2012). 15.Tao, H., and Adams, C. Pass-Go: A proposal to improve the usability of graphical passwords. International Journal of Network Security 7, 2 (2008). 16.van Oorschot, P. C., and Thorpe, J. On predictive models and user-drawn graphical passwords. ACM Transactions on Information System Security 10, 4 (2008

You May Also Find These Documents Helpful

  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Create a Windows application that contains two textboxes and two buttons. One of thetextboxes and one of the buttons are initially invisible. The first textbox should be used to input a password. The textbox should be masked to some character of your choice so that the characters entered by the user are not seen on the screen. When the user clicks the first button, the second textbox and button should be displayed with a prompt asking the user to reenter his or her password. Now, when the user clicks the second button, have the application compare the values entered to make sure they are the same. Display an appropriate message indicating whether they are the…

    • 1713 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Every time we have to change our index page htmls for an assignment, we have to log into our personalized servers with passwords. The reason for these passwords is because the information and permissions we have access to should be given to everyone, and therefore the information we have is encrypted from others. As it has become increasingly apparent, our everyday cyber footprint involves many interactions with some sort of encryption. Because of this, most of everything we discuss in class can be considered relevant to the importance of cryptography and/or…

    • 773 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the article, “The psychology of password management: a tradeoff between security and convenience”, the author…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Huopio, Simo 1998; Biometric Identification, Network Security 1998: Biometric Identification; Helsinki University of Technology; http://www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric retrieved 07/15/06…

    • 2093 Words
    • 9 Pages
    Powerful Essays