Graphical Password Authentication Using PassPoint and PTC Scheme

Authors

  • Ashutosh Kumar
  • Maina Changeriwal

Keywords:

Authentication schemes, graphical schemes, hybrid schemes, locimetric schemes, passpoints, press touch code

Abstract

Mobile devices, which would hold a lot of private and sensitive information, are now a requirement in people's daily lives due to their rising capability. This makes smartphones a top target for cyberattacks, as either the loss of such mobile devices or unauthorised access will result in a breach of personal data and financial harm. Over the past few years, a number of new types of authentication systems have been presented in an effort to allay that worry. One of those classes is Graphical Authentication (GA), which is the subject of this study. Due to their primarily graphics-oriented nature, superior memorability versus text-based schemes, and lack of additional hardware requirements, GA schemes are more well-liked and preferred for smart devices. The majority of these GA systems are vulnerable to many well-known attacks, including brute force, shoulder surfing, and smudging. As a result, a novel hybrid authentication scheme, Passpoints and Press Touch Code, or PTC, that smoothly combines two distinct yet widely used authentication techniques is proposed in this work. By thwarting those well-known threats, this new technique aims to provide a higher level of security.

References

Biocco P, Anwar M. Grid authentication: A memorability and user sentiment study. In HCI for Cybersecurity, Privacy and Trust (Lecture Notes in Computer Science). Vol. 11594. Cham, Switzerland: Springer; 2019.

Azad S, Rahman M, Ranak MSAN, Ruhee BMFK, Nisa NN, Rahman A, Zain JM, Kabir N. VAP code: A secure graphical password for smart devices. Comput Elect Eng. 2017 Apr; 59: 99–110.

Jiang Q, Zeadally S, Ma J, He D. Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks. IEEE Access. 2017; 5: 3376–3392.

Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM. Smudge attacks on smartphone touch screens. In Proc 4th USENIX Workshop Offensive Technol. 2010; 1–10.

Gao H, Jia W, Ye F, Ma L. A survey on the use of graphical passwords in security. J Softw. 2013; 8(7): 1678–1698.

Osunade O, Oloyede IA, Azeez TO. Graphical user authentication system resistant to shoulder surfing attack. Adv Res. 2019; 19(4): 1–8.

Sreelatha M, Shashi M, Anirudh M, Ahamer MS, Kumar VM. Authentication schemes for session passwords using color and images. Int J Netw Secur Appl. 2011; 3(3): 111–119.

Amin R, Maitra T, Giri D, Srivastava PD. Cryptanalysis and improvement of an RSA based remote user authentication scheme using smart card. Wireless Pers Commun. 2017 Oct; 96(3): 4629–4659.

Blonder GE. Graphical password. US Patent 5 559 961; 1996.

Lin C, He D, Kumar N, Choo K-K-R, Vinel A, Huang X. Security and privacy for the Internet of drones: Challenges and solutions. IEEE Commun Mag. 2018 Jan; 56(1): 64–69.

Published

2023-03-07

How to Cite

Kumar, A. ., & Changeriwal, M. . (2023). Graphical Password Authentication Using PassPoint and PTC Scheme. JOURNAL OF OPERATING SYSTEMS DEVELOPMENT &Amp; TRENDS, 9(3), 1–7. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoOSDT/article/view/438