Abstract
In many smart devices and numerous digital applications, authentication mechanisms are widely used to validate the legitimacy of users’ identification. As a result of the increased use of mobile devices, most people tend to save sensitive and secret information over such devices. Personal Identification Number (PIN)-based and alphanumeric passwords are simple to remember, but at the same time, they are vulnerable to hackers. Being difficult to guess and more user-friendly, graphical passwords have grown in popularity as an alternative to all such textual passwords. This paper describes an innovative, hybrid, and much more robust user authentication approach, named GRA-PIN (GRAphical and PIN-based), which combines the merits of both graphical and pin-based techniques. The feature of simple arithmetic operations (addition and subtraction) is incorporated in the proposed scheme, through which random passwords are generated for each login attempt. In the study, we have conducted a comparative study between the GRA-PIN scheme with existing PIN-based and pattern-based (swipe-based) authentications approaches using the standard Software Usability Scale (SUS). The usability score of GRA-PIN was analyzed to be as high as 94%, indicating that it is more reliable and user friendly. Furthermore, the security of the proposed scheme was challenged through an experiment wherein three different attackers, having a complete understanding of the proposed scheme, attempted to crack the technique via shoulder surfing, guessing, and camera attack, but they were unsuccessful.
Funder
National Research Foundation of Korea
King Saud University
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference32 articles.
1. A review of authentication methods;Lal;Int. J. Sci. Technol. Res.,2016
2. An Overview of Different Authentication Methods and Protocols;Duncan,2001
3. Multi-factor Authentication as a Service
4. Computer Security: Art and Science;Bishop,2012
5. Information Security: Principles and Practice;Stamp,2011
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Graphical User Authentication Algorithms Based on Recognition;ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY;2024-08-23
2. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords;Electronics;2024-08-01
3. A Random and Unselectable Graphic Password Scheme;2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC);2024-03-15
4. Graphical Password Authentication using Image Processing (GPAIP);2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
5. Reimagining Authentication: A User-Centric Two-Factor Authentication with Personalized Image Verification;2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS);2024-01-28