Cargando…
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches a...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/ https://www.ncbi.nlm.nih.gov/pubmed/24991649 http://dx.doi.org/10.1155/2014/838623 |
_version_ | 1782321124445519872 |
---|---|
author | Ho, Peng Foong Kam, Yvonne Hwei-Syn Wee, Mee Chin Chong, Yu Nam Por, Lip Yee |
author_facet | Ho, Peng Foong Kam, Yvonne Hwei-Syn Wee, Mee Chin Chong, Yu Nam Por, Lip Yee |
author_sort | Ho, Peng Foong |
collection | PubMed |
description | Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. |
format | Online Article Text |
id | pubmed-4058474 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-40584742014-07-02 Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information Ho, Peng Foong Kam, Yvonne Hwei-Syn Wee, Mee Chin Chong, Yu Nam Por, Lip Yee ScientificWorldJournal Research Article Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. Hindawi Publishing Corporation 2014 2014-05-27 /pmc/articles/PMC4058474/ /pubmed/24991649 http://dx.doi.org/10.1155/2014/838623 Text en Copyright © 2014 Peng Foong Ho et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Ho, Peng Foong Kam, Yvonne Hwei-Syn Wee, Mee Chin Chong, Yu Nam Por, Lip Yee Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title | Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title_full | Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title_fullStr | Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title_full_unstemmed | Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title_short | Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information |
title_sort | preventing shoulder-surfing attack with the concept of concealing the password objects' information |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058474/ https://www.ncbi.nlm.nih.gov/pubmed/24991649 http://dx.doi.org/10.1155/2014/838623 |
work_keys_str_mv | AT hopengfoong preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation AT kamyvonnehweisyn preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation AT weemeechin preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation AT chongyunam preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation AT porlipyee preventingshouldersurfingattackwiththeconceptofconcealingthepasswordobjectsinformation |