Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms

被引:12
|
作者
Belk, Marios [1 ,2 ]
Pamboris, Andreas [2 ,3 ]
Fidas, Christos [4 ]
Katsini, Christina [5 ]
Avouris, Nikolaos [5 ]
Samaras, George [6 ]
机构
[1] Cognit UX GmbH, Heiligkreuzsteinach, Germany
[2] Univ Cyprus, Dept Comp Sci, Nicosia, Cyprus
[3] Univ Cent Lancashire, Sch Sci, Preston, Lancs, England
[4] Univ Patras, Dept Cultural Heritage Management & New Technol, Patras, Greece
[5] Univ Patras, Dept Elect & Comp Engn, HCI Grp, Patras, Greece
[6] Univ Cyprus, Dept Comp Sci, Dipartimento Fis & Geol, Nicosia, Cyprus
来源
2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017) | 2017年
基金
欧盟地平线“2020”;
关键词
Recognition-based Graphical Authentication; Security; Usability; User Study; Eye-tracking; SUPERIORITY;
D O I
10.1145/3106426.3106488
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper investigates the trade-off between security and usability in recognition-based graphical authentication mechanisms. Through a user study (N=103) based on a real usage scenario, it draws insights about the security strength and memorability of a chosen password with respect to the amount of images presented to users during sign-up. In particular, it reveals the users' predisposition in following predictable patterns when selecting graphical passwords, and its effect on practical security strength. It also demonstrates that a "sweetspot" exists between security and usability in graphical authentication approaches on the basis of adjusting accordingly the image grid size presented to users when creating passwords. The results of the study can be leveraged by researchers and practitioners engaged in designing intelligent graphical authentication user interfaces for striking an appropriate balance between security and usability.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [41] Security architecture for authentication and authorization in the intelligent and ubiquitous home network
    Lee, Hyungkyu
    Han, Jongwook
    Chung, Kyoil
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 1110 - +
  • [42] On designing usable and secure recognition-based graphical authentication mechanisms
    Mihajlov, Martin
    Jerman-Blazic, Borka
    INTERACTING WITH COMPUTERS, 2011, 23 (06) : 582 - 593
  • [43] Intelligent Security Authentication for Connected and Autonomous Vehicles: Attacks and Defenses
    Qiu, Xiaoying
    Yu, Jinwei
    Jiang, Wenbao
    Sun, Xuan
    ELECTRONICS, 2024, 13 (08)
  • [44] On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
    Cho, Geumhwan
    Huh, Jun Ho
    Kim, Soolin
    Cho, Junsung
    Park, Heesung
    Lee, Yenah
    Beznosov, Konstantin
    Kim, Hyoungshick
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (04)
  • [45] I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves
    Chuang, John
    Hamilton Nguyen
    Wang, Charles
    Johnson, Benjamin
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 1 - 16
  • [46] Evaluating security and usability of profile based challenge questions authentication in online examinations
    Ullah, Abrar
    Xiao, Hannan
    Barker, Trevor
    Lilley, Mariana
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2014, 5 (05) : 1 - 16
  • [47] Deploying authentication in the wild: towards greater ecological validity in security usability studies
    Aebischer, Seb
    Dettoni, Claudio
    Jenkinson, Graeme
    Krol, Kat
    Llewellyn-Jones, David
    Masui, Toshiyuki
    Stajano, Frank
    JOURNAL OF CYBERSECURITY, 2020, 6 (01):
  • [48] Security, usability, and biometric authentication scheme for electronic voting using multiple keys
    Ahmad, Masood
    Rehman, Ateeq Ur
    Ayub, Nighat
    Alshehri, M. D.
    Khan, Muazzam A.
    Hameed, Abdul
    Yetgin, Halil
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (07)
  • [49] Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes
    Hayashi, Eiji
    Hong, Jason I.
    Christin, Nicolas
    29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2011, : 2055 - 2064
  • [50] Enhancing the security of FinTech applications with map-based graphical password authentication
    Meng, Weizhi
    Zhu, Liqiu
    Li, Wenjuan
    Han, Jinguang
    Li, Yan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 1018 - 1027