Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks

Author:

Adebimpe Lateef Adekunle12,Ng Ian Ouii1,Idris Mohd Yamani Idna1,Okmi Mohammed13,Ku Chin Soon4ORCID,Ang Tan Fong1,Por Lip Yee1ORCID

Affiliation:

1. Department of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur 50603, Malaysia

2. Department of Computer Science, Emmanuel Alayande University of Education, Oyo 211225, Nigeria

3. Department of Information Technology and Security, Jazan University, Jazan 45142, Saudi Arabia

4. Department of Computer Science, Universiti Tunku Abdul Rahman, Kampar 31900, Malaysia

Abstract

The rapid advancement of information technology (IT) has given rise to a new era of efficient and fast communication and transactions. However, the increasing adoption of and reliance on IT has led to the exposure of personal and sensitive information online. Safeguarding this information against unauthorized access remains a persistent challenge, necessitating the implementation of improved computer security measures. The core objective of computer security is to ensure the confidentiality, availability, and integrity of data and services. Among the mechanisms developed to counter security threats, authentication stands out as a pivotal defense strategy. Graphical passwords have emerged as a popular authentication approach, yet they face vulnerability to shoulder-surfing attacks, wherein an attacker can clandestinely observe a victim’s actions. Shoulder-surfing attacks present a significant security challenge within the realm of graphical password authentication. These attacks occur when an unauthorized individual covertly observes the authentication process of a legitimate user by shoulder surfing the user or capturing the interaction through a video recording. In response to this challenge, various methods have been proposed to thwart shoulder-surfing attacks, each with distinct advantages and limitations. This study thus centers on reviewing the resilience of existing recognition-based graphical password techniques against shoulder-surfing attacks by conducting a comprehensive examination and evaluation of their benefits, strengths, and weaknesses. The evaluation process entailed accessing pertinent academic resources through renowned search engines, including Web of Science, Science Direct, IEEE Xplore, ProQuest, Scopus, Springer, Wiley Online Library, and EBSCO. The selection criteria were carefully designed to prioritize studies that focused on recognition-based graphical password methods. Through this rigorous approach, 28 studies were identified and subjected to a thorough review. The results show that fourteen of them adopted registered objects as pass-objects, bolstering security through object recognition. Additionally, two methods employed decoy objects as pass-objects, enhancing obfuscation. Notably, one technique harnessed both registered and decoy objects, amplifying the security paradigm. The results also showed that recognition-based graphical password techniques varied in their resistance to different types of shoulder-surfing attacks. Some methods were effective in preventing direct observation attacks, while others were vulnerable to video-recorded and multiple-observation attacks. This vulnerability emerged due to attackers potentially extracting key information by analyzing user interaction patterns in each challenge set. Notably, one method stood out as an exception, demonstrating resilience against all three types of shoulder-surfing attacks. In conclusion, this study contributes to a comprehensive understanding of the efficacy of recognition-based graphical password methods in countering shoulder-surfing attacks by analyzing the diverse strategies employed by these methods and revealing their strengths and weaknesses.

Funder

Universiti of Tunku Abdul Rahman in Malaysia

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference53 articles.

1. Faircloth, C., Hartzell, G., Callahan, N., and Bhunia, S. (2022, January 6–9). A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA.

2. Development Status and Prospects of Graphical Password Authentication System in Korea;Yang;KSII Trans. Internet Inf. Syst.,2019

3. Siddiqui, M.U., Umar, M.S., and Siddiqui, M. (2018, January 14–15). A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme. Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India.

4. Passblot: A highly scalable graphical one time password system;Gupta;Int. J. Netw. Secur. Appl.,2012

5. A Face Recognition and Graphical Password Based Hybrid Technique of Information Security;Wajid;Pak. J. Sci.,2018

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3