Secure pattern-based authentication against shoulder surfing attack in smart devices

Hyungjun Shin, Daeyoung Kim, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Today, although the password authentication is used widely, since users write their password directly on screen and tend to make their password easy to remember, they may be vulnerable to several attacks such as brute-force, guessing, replay, and shoulder surfing. Although many authentication schemes were proposed to improve the usability and security, they are sill vulnerable to the shoulder surfing attack. In this paper, we propose a novel pattern-based authentication scheme which is secure against this attack. Also, we analyze the usability, deployability, and security of the proposed authentication scheme, compared to the other authentication schemes in smart devices.

Original languageEnglish
Title of host publicationICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Pages13-18
Number of pages6
ISBN (Electronic)9781479989935
DOIs
Publication statusPublished - 2015 Aug 7
Event7th International Conference on Ubiquitous and Future Networks, ICUFN 2015 - Sapporo, Japan
Duration: 2015 Jul 72015 Jul 10

Publication series

NameInternational Conference on Ubiquitous and Future Networks, ICUFN
Volume2015-August
ISSN (Print)2165-8528
ISSN (Electronic)2165-8536

Other

Other7th International Conference on Ubiquitous and Future Networks, ICUFN 2015
Country/TerritoryJapan
CitySapporo
Period15/7/715/7/10

Keywords

  • authentication
  • brute-force attack
  • guessing attack
  • replay attack
  • shoulder surfing attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Secure pattern-based authentication against shoulder surfing attack in smart devices'. Together they form a unique fingerprint.

Cite this