Spyware Resistant Smartphone User Authentication Scheme
As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Br...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2014-03-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2014/237125 |
_version_ | 1797718731637391360 |
---|---|
author | Taejin Kim Jeong Hyun Yi Changho Seo |
author_facet | Taejin Kim Jeong Hyun Yi Changho Seo |
author_sort | Taejin Kim |
collection | DOAJ |
description | As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Brute Force Attack, Shoulder-Surfing Attack, and Recording Attack. Various authentication techniques are being developed in order to solve these problems. However, the technique that provides perfect protection, even from the Recording Attack, is not yet known, and in most cases, a password can be exposed by multiple Recording Attacks. This paper proposes a new user authentication method that protects against a Recording Attack from spyware on the user's smart phone. The proposed method prevents password exposure by multiple Recording Attacks, is implemented on a real Android phone, and has been evaluated for usability. |
first_indexed | 2024-03-12T08:54:39Z |
format | Article |
id | doaj.art-3a72cdf87bb84596b94562e086f7cd58 |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T08:54:39Z |
publishDate | 2014-03-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-3a72cdf87bb84596b94562e086f7cd582023-09-02T16:08:06ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772014-03-011010.1155/2014/237125237125Spyware Resistant Smartphone User Authentication SchemeTaejin Kim0Jeong Hyun Yi1Changho Seo2 School of Computer Science and Engineering, Soongsil University, Seoul 156-743, Republic of Korea School of Computer Science and Engineering, Soongsil University, Seoul 156-743, Republic of Korea Department of Applied Mathematics, Kongju National University, Kongju 314-701, Republic of KoreaAs smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Brute Force Attack, Shoulder-Surfing Attack, and Recording Attack. Various authentication techniques are being developed in order to solve these problems. However, the technique that provides perfect protection, even from the Recording Attack, is not yet known, and in most cases, a password can be exposed by multiple Recording Attacks. This paper proposes a new user authentication method that protects against a Recording Attack from spyware on the user's smart phone. The proposed method prevents password exposure by multiple Recording Attacks, is implemented on a real Android phone, and has been evaluated for usability.https://doi.org/10.1155/2014/237125 |
spellingShingle | Taejin Kim Jeong Hyun Yi Changho Seo Spyware Resistant Smartphone User Authentication Scheme International Journal of Distributed Sensor Networks |
title | Spyware Resistant Smartphone User Authentication Scheme |
title_full | Spyware Resistant Smartphone User Authentication Scheme |
title_fullStr | Spyware Resistant Smartphone User Authentication Scheme |
title_full_unstemmed | Spyware Resistant Smartphone User Authentication Scheme |
title_short | Spyware Resistant Smartphone User Authentication Scheme |
title_sort | spyware resistant smartphone user authentication scheme |
url | https://doi.org/10.1155/2014/237125 |
work_keys_str_mv | AT taejinkim spywareresistantsmartphoneuserauthenticationscheme AT jeonghyunyi spywareresistantsmartphoneuserauthenticationscheme AT changhoseo spywareresistantsmartphoneuserauthenticationscheme |