Contemporary Visual Authentication Protocols to Tackle Key Logging Issues

Jahoor Sulthana Patan, Md. Amamatulla

Abstract


In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.
Keywords — Authentication; Smartphone; Malicious code; Key logger

Full Text:

PDF




Copyright (c) 2015 Jahoor Sulthana Patan, Md. Amamatulla

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org