Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms

被引:12
|
作者
Belk, Marios [1 ,2 ]
Pamboris, Andreas [2 ,3 ]
Fidas, Christos [4 ]
Katsini, Christina [5 ]
Avouris, Nikolaos [5 ]
Samaras, George [6 ]
机构
[1] Cognit UX GmbH, Heiligkreuzsteinach, Germany
[2] Univ Cyprus, Dept Comp Sci, Nicosia, Cyprus
[3] Univ Cent Lancashire, Sch Sci, Preston, Lancs, England
[4] Univ Patras, Dept Cultural Heritage Management & New Technol, Patras, Greece
[5] Univ Patras, Dept Elect & Comp Engn, HCI Grp, Patras, Greece
[6] Univ Cyprus, Dept Comp Sci, Dipartimento Fis & Geol, Nicosia, Cyprus
来源
2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017) | 2017年
基金
欧盟地平线“2020”;
关键词
Recognition-based Graphical Authentication; Security; Usability; User Study; Eye-tracking; SUPERIORITY;
D O I
10.1145/3106426.3106488
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates the trade-off between security and usability in recognition-based graphical authentication mechanisms. Through a user study (N=103) based on a real usage scenario, it draws insights about the security strength and memorability of a chosen password with respect to the amount of images presented to users during sign-up. In particular, it reveals the users' predisposition in following predictable patterns when selecting graphical passwords, and its effect on practical security strength. It also demonstrates that a "sweetspot" exists between security and usability in graphical authentication approaches on the basis of adjusting accordingly the image grid size presented to users when creating passwords. The results of the study can be leveraged by researchers and practitioners engaged in designing intelligent graphical authentication user interfaces for striking an appropriate balance between security and usability.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [31] Unboxing fog security: a review of fog security and authentication mechanisms
    Kaliya, Neha
    Pawar, Digambar
    COMPUTING, 2023, 105 (12) : 2793 - 2819
  • [32] Unboxing fog security: a review of fog security and authentication mechanisms
    Neha Kaliya
    Digambar Pawar
    Computing, 2023, 105 : 2793 - 2819
  • [33] Mobile Intelligent Network security with SIP Authentication Procedure
    Abdallah, Handoura
    Daniel, Bourget
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2638 - 2643
  • [34] Authentication System for Websites with Paid Content: An Overview of Security and Usability Issues
    Hurkala, Adam
    Hurkala, Jaroslaw
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (07): : 42 - 49
  • [35] On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
    Wang, Tianhao
    Ge, Huangyi
    Chowdhury, Omar
    Maji, Hemanta K.
    Li, Ninghui
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 603 - 615
  • [36] Examining Security and Usability Aspects of Knowledge-based Authentication Methods
    Bosnjak, L.
    Brumen, B.
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 1181 - 1186
  • [37] Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
    Nizamani, Shah Zaman
    Sahito, Waqas Ali
    Awan, Shafique
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 489 - 495
  • [38] Towards Gaze-Based Quantification of the Security of Graphical Authentication Schemes
    Katsini, Christina
    Raptis, George E.
    Fidas, Christos
    Avouris, Nikolaos
    2018 ACM SYMPOSIUM ON EYE TRACKING RESEARCH & APPLICATIONS (ETRA 2018), 2018,
  • [39] A Review on Secure Authentication Mechanisms for Mobile Security
    Ul Hasan, Syed Shabih
    Ghani, Anwar
    Daud, Ali
    Akbar, Habib
    Khan, Muhammad Faizan
    SENSORS, 2025, 25 (03)
  • [40] Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords
    Stobert, Elizabeth
    Forget, Alain
    Chiasson, Sonia
    van Oorschot, P. C.
    Biddle, Robert
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 79 - 88