Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

Abstract

Knowledge based authentication schemes are divided into textual password schemes and graphical password schemes. Textual password schemes are easy to use but have well known security issues, such as weak against online security attacks. Graphical password schemes are generally weak against shoulder surfing attacks. Usability is another issue with most of the graphical password schemes. For improving security of knowledge-based authentication schemes complex password entry procedures are used, which improve security but weakens useability of the authentication schemes. In order to resolve this security and usability conflict, a user authentication scheme is proposed, which contains one registration and two login screens called easy and secure login screens. Easy login screen provides easy and quick way of authentication while secure login screen is resilient to different online security attacks. A user has to decide based upon the authentication environment, which login screen to be used for authentication. For secure environment, where chances of security attacks are less easy login screen is recommended. For insecure environments where chances of security attacks are high, secure login screen is recommended for authentication. In the proposed scheme, image based passwords can also be set along with alphanumeric passwords. Results suggest that proposed scheme improves security against offline and online attacks.

Authors and Affiliations

Shah Zaman Nizamani, Waqas Ali Sahito, Shafique Awan

Keywords

Related Articles

Loop Modeling Forward and Feedback Analysis in Cerebral Arteriovenous Malformation

Cerebral Arteriovenous Malformation (CAVM) hemodynamic in disease condition results changes in the flow and pressure level in blood vessels. Cerebral Arteriovenous Malformation (CAVM) is an abnormal shunting of vessels b...

Gender Prediction for Expert Finding Task

Predicting gender by names is one of the most interesting problems in the domain of Information Retrieval and expert finding task. In this research paper, we propose a machine learning approach for gender prediction task...

A Linear Array for Short Range Radio Location and Application Systems

Patch array antennas have primarily been good candidates for higher performance results in communication systems. This paper comprises of linear 1x4 patch antenna array study constructed on 1.575mm thick Roggers 5880 sub...

Online Reputation Model Using Moving Window

Users are increasingly dependent on decision tools to facilitate their transactions on the internet. Reputation models offer a solution to the users in supporting their purchase decisions. The reputation model takes prod...

Time-Domain Large Signal Investigation on Dynamic Responses of the GDCC Quarterly Wavelength Shifted Distributed Feedback Semiconductor Laser

A numerical investigation on the dynamic large-signal analysis using a time-domain traveling wave model of quarter wave-shifted distributed feedback semiconductor lasers diode with a Gaussian distribution of the coupling...

Download PDF file
  • EP ID EP319109
  • DOI 10.14569/IJACSA.2018.090564
  • Views 87
  • Downloads 0

How To Cite

Shah Zaman Nizamani, Waqas Ali Sahito, Shafique Awan (2018). Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication. International Journal of Advanced Computer Science & Applications, 9(5), 489-495. https://europub.co.uk/articles/-A-319109