Spyware Resistant Smartphone User Authentication Scheme

As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Br...

Full description

Bibliographic Details
Main Authors: Taejin Kim, Jeong Hyun Yi, Changho Seo
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2014-03-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2014/237125
_version_ 1797718731637391360
author Taejin Kim
Jeong Hyun Yi
Changho Seo
author_facet Taejin Kim
Jeong Hyun Yi
Changho Seo
author_sort Taejin Kim
collection DOAJ
description As smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Brute Force Attack, Shoulder-Surfing Attack, and Recording Attack. Various authentication techniques are being developed in order to solve these problems. However, the technique that provides perfect protection, even from the Recording Attack, is not yet known, and in most cases, a password can be exposed by multiple Recording Attacks. This paper proposes a new user authentication method that protects against a Recording Attack from spyware on the user's smart phone. The proposed method prevents password exposure by multiple Recording Attacks, is implemented on a real Android phone, and has been evaluated for usability.
first_indexed 2024-03-12T08:54:39Z
format Article
id doaj.art-3a72cdf87bb84596b94562e086f7cd58
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T08:54:39Z
publishDate 2014-03-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-3a72cdf87bb84596b94562e086f7cd582023-09-02T16:08:06ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772014-03-011010.1155/2014/237125237125Spyware Resistant Smartphone User Authentication SchemeTaejin Kim0Jeong Hyun Yi1Changho Seo2 School of Computer Science and Engineering, Soongsil University, Seoul 156-743, Republic of Korea School of Computer Science and Engineering, Soongsil University, Seoul 156-743, Republic of Korea Department of Applied Mathematics, Kongju National University, Kongju 314-701, Republic of KoreaAs smart phones are becoming widely used, a variety of services to store and use important information such as photos and financial information are now provided. User authentication to protect this information is increasingly important. The commonly used 4-digit PIN, however, is vulnerable to the Brute Force Attack, Shoulder-Surfing Attack, and Recording Attack. Various authentication techniques are being developed in order to solve these problems. However, the technique that provides perfect protection, even from the Recording Attack, is not yet known, and in most cases, a password can be exposed by multiple Recording Attacks. This paper proposes a new user authentication method that protects against a Recording Attack from spyware on the user's smart phone. The proposed method prevents password exposure by multiple Recording Attacks, is implemented on a real Android phone, and has been evaluated for usability.https://doi.org/10.1155/2014/237125
spellingShingle Taejin Kim
Jeong Hyun Yi
Changho Seo
Spyware Resistant Smartphone User Authentication Scheme
International Journal of Distributed Sensor Networks
title Spyware Resistant Smartphone User Authentication Scheme
title_full Spyware Resistant Smartphone User Authentication Scheme
title_fullStr Spyware Resistant Smartphone User Authentication Scheme
title_full_unstemmed Spyware Resistant Smartphone User Authentication Scheme
title_short Spyware Resistant Smartphone User Authentication Scheme
title_sort spyware resistant smartphone user authentication scheme
url https://doi.org/10.1155/2014/237125
work_keys_str_mv AT taejinkim spywareresistantsmartphoneuserauthenticationscheme
AT jeonghyunyi spywareresistantsmartphoneuserauthenticationscheme
AT changhoseo spywareresistantsmartphoneuserauthenticationscheme