| Literature DB >> 29084262 |
M S A Noman Ranak1, Saiful Azad1,2, Nur Nadiah Hanim Binti Mohd Nor1, Kamal Z Zamli1,2.
Abstract
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.Entities:
Mesh:
Year: 2017 PMID: 29084262 PMCID: PMC5662178 DOI: 10.1371/journal.pone.0186940
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Data acquisition process.
Fig 2The acquired data and the smoothed data for various spans are shown.
Fig 3The 2 × 2 grid for multi-PTC with grid technique.
Fig 4(a) Flowchart of the registration phase of the multi-PTC variant and (b) Flowchart of the authentication phase of the multi-PTC variant.
Fig 5Experimental setup for discovering shoulder surfing attack on multi-PTC and Knock Code.
Experimental results of shoulder surfing attack.
| Distance (m) | multi-PTC | Knock Code | ||||
|---|---|---|---|---|---|---|
| Left | Front | Right | Left | Front | Right | |
| 0.5 | 0 | 0 | 0 | 0 | 0 | 0 |
| 2 | 0.37 | 0.5 | 0.875 | 0.37 | 0.5 | 0.67 |
| 3 | 0.625 | 0.95 | 0.75 | 0.125 | 0.1 | 0.615 |
The password space, P for three variants of the proposed scheme when μ = 10 and N = 4.
| mono-PTC | mulit-PTC | multi-PTC with Grid | |
|---|---|---|---|
| 10 | 1 | 10 | 40 |
| 10 | 2 | 100 | 1600 |
| 10 | 3 | 1000 | 64000 |
| 10 | 4 | 10000 | 2560000 |
| 10 | 5 | 100000 | 102400000 |
| 10 | 6 | 1000000 | 4096000000 |
| 10 | 7 | 10000000 | 163840000000 |
| 10 | 8 | 100000000 | 6553600000000 |
| 10 | 9 | 1000000000 | 262144000000000 |
Fig 6Results of the conducted survey.
Comparison of prominent related schemes with the three variants of the proposed scheme.
| Attack/Function | PIN | AN | APL | VAPC | KC | mono-PTC | multi-PTC | multi-PTC with Grid |
|---|---|---|---|---|---|---|---|---|
| Shoulder surfing | H | H | H | L | M | LM | LM | LM |
| Brute force | H | M | M | L | L | H | M | L |
| Smudge | M | M | H | L | L | L | L | L |
| Screen Size Independence | N | N | N | N | Y | Y | Y | N |
| Short Authentication Time | Y | Y | Y | N | Y | Y | Y | Y |
L—Low, LM—Lower Medium, M—Medium, H—High, N—No, Y—Yes.