On Overcoming the Identified Limitations of a Usable PIN Entry Method

In the domain of password security, research has made significant progress in handling different kinds of threats which require human intelligence factor to fix the vulnerabilities. In spite of having strong theoretical establishments, most of these defense mechanisms cannot be used in practice as h...

Full description

Bibliographic Details
Main Authors: Nilesh Chakraborty, Jianqiang Li, Samrat Mondal, Fei Chen, Yi Pan
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8817967/
_version_ 1818416078688092160
author Nilesh Chakraborty
Jianqiang Li
Samrat Mondal
Fei Chen
Yi Pan
author_facet Nilesh Chakraborty
Jianqiang Li
Samrat Mondal
Fei Chen
Yi Pan
author_sort Nilesh Chakraborty
collection DOAJ
description In the domain of password security, research has made significant progress in handling different kinds of threats which require human intelligence factor to fix the vulnerabilities. In spite of having strong theoretical establishments, most of these defense mechanisms cannot be used in practice as humans have limitations in processing complex information. The little bit of good news is that very few research proposals in this field have shown the promises to be deployable in practice. This paper focuses on such one method - proposed by Roth et al. back in 2004, which provides adequate user-friendliness to enter Personal Identification Number (PIN) securely in the presence of human shoulder surfers. Surprisingly, the background algorithm of this method for validating users' responses runs in linear time on a search space of cardinality 5 and hence, the validation process does not put much load on the authenticating device. Therefore, such human identification protocol can also be integrated into the IoT infrastructure for conducting a more secured login from the client-side. Having such advantages, though remained secure for almost ten years after its release in 2004, recently, few proposals revealed some serious vulnerable aspects of the Roth et al.'s proposal. In this paper, we have taken an attempt to save this user-friendly form of authentication. Firstly, we have made a critical discussion on the importance of the targeted PIN entry method in the domain of usable security and then given a brief overview of the identified limitations of this protocol. Followed by this, a few initiatives have been taken to fix the identified vulnerabilities of Roth et al.'s proposal by revising its working principle, while the login procedure and the usability standard of this method stay unaffected.
first_indexed 2024-12-14T11:45:10Z
format Article
id doaj.art-6fd170bb68af427995da31f6e3abb129
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T11:45:10Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6fd170bb68af427995da31f6e3abb1292022-12-21T23:02:38ZengIEEEIEEE Access2169-35362019-01-01712436612437810.1109/ACCESS.2019.29379488817967On Overcoming the Identified Limitations of a Usable PIN Entry MethodNilesh Chakraborty0https://orcid.org/0000-0002-3825-8838Jianqiang Li1Samrat Mondal2Fei Chen3https://orcid.org/0000-0001-8132-539XYi Pan4College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, ChinaCollege of Computer Science and Software Engineering, Shenzhen University, Shenzhen, ChinaDepartment of Computer Science and Engineering, IIT Patna, Patna, IndiaCollege of Computer Science and Software Engineering, Shenzhen University, Shenzhen, ChinaDepartment of Computer Science, Georgia State University, Atlanta, GA, USAIn the domain of password security, research has made significant progress in handling different kinds of threats which require human intelligence factor to fix the vulnerabilities. In spite of having strong theoretical establishments, most of these defense mechanisms cannot be used in practice as humans have limitations in processing complex information. The little bit of good news is that very few research proposals in this field have shown the promises to be deployable in practice. This paper focuses on such one method - proposed by Roth et al. back in 2004, which provides adequate user-friendliness to enter Personal Identification Number (PIN) securely in the presence of human shoulder surfers. Surprisingly, the background algorithm of this method for validating users' responses runs in linear time on a search space of cardinality 5 and hence, the validation process does not put much load on the authenticating device. Therefore, such human identification protocol can also be integrated into the IoT infrastructure for conducting a more secured login from the client-side. Having such advantages, though remained secure for almost ten years after its release in 2004, recently, few proposals revealed some serious vulnerable aspects of the Roth et al.'s proposal. In this paper, we have taken an attempt to save this user-friendly form of authentication. Firstly, we have made a critical discussion on the importance of the targeted PIN entry method in the domain of usable security and then given a brief overview of the identified limitations of this protocol. Followed by this, a few initiatives have been taken to fix the identified vulnerabilities of Roth et al.'s proposal by revising its working principle, while the login procedure and the usability standard of this method stay unaffected.https://ieeexplore.ieee.org/document/8817967/AuthenticationPINobservation-attackkey-logger-attackdefensehuman-intelligence-factor
spellingShingle Nilesh Chakraborty
Jianqiang Li
Samrat Mondal
Fei Chen
Yi Pan
On Overcoming the Identified Limitations of a Usable PIN Entry Method
IEEE Access
Authentication
PIN
observation-attack
key-logger-attack
defense
human-intelligence-factor
title On Overcoming the Identified Limitations of a Usable PIN Entry Method
title_full On Overcoming the Identified Limitations of a Usable PIN Entry Method
title_fullStr On Overcoming the Identified Limitations of a Usable PIN Entry Method
title_full_unstemmed On Overcoming the Identified Limitations of a Usable PIN Entry Method
title_short On Overcoming the Identified Limitations of a Usable PIN Entry Method
title_sort on overcoming the identified limitations of a usable pin entry method
topic Authentication
PIN
observation-attack
key-logger-attack
defense
human-intelligence-factor
url https://ieeexplore.ieee.org/document/8817967/
work_keys_str_mv AT nileshchakraborty onovercomingtheidentifiedlimitationsofausablepinentrymethod
AT jianqiangli onovercomingtheidentifiedlimitationsofausablepinentrymethod
AT samratmondal onovercomingtheidentifiedlimitationsofausablepinentrymethod
AT feichen onovercomingtheidentifiedlimitationsofausablepinentrymethod
AT yipan onovercomingtheidentifiedlimitationsofausablepinentrymethod