The Coin Passcode: A Shoulder-Surfing Proof Graphical Password Authentication Model for Mobile Devices
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 1
Abstract
Swiftness, simplicity, and security is crucial for mobile device authentication. Currently, most mobile devices are protected by a six pin numerical passcode authentication layer which is extremely vulnerable to Shoulder-Surfing attacks and Spyware attacks. This paper proposes a multi-elemental graphical password authentication model for mobile devices that are resistant to shoulder surfing attacks and spyware attacks. The proposed Coin Passcode model simplifies the complex user interface issues that previous graphical password models have, which work as a swift passcode security mechanism for mobile devices. The Coin Passcode model also has a high memorability rate compared to the existing numerical and alphanumerical passwords, as psychology studies suggest that human are better at remembering graphics than words. The results shows that the Coin Passcode is able to overcome the current shoulder-surfing and spyware attack vulnerability that existing mobile application numerical passcode authentication layers suffer from.
Authors and Affiliations
Teoh joo Fong, Azween Abdullah, NZ Jhanjhi, Mahadevan Supramaniam
Evaluating Web Accessibility Metrics for Jordanian Universities
University web portals are considered one of the main access gateways for universities. Typically, they have a large candidate audience among the current students, employees, and faculty members aside from previous and f...
Software Defined Security Service Provisioning Framework for Internet of Things
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking...
Content based Video Retrieval Systems Performance based on Multiple Features and Multiple Frames using SVM
In this paper, Content Based Video Retrieval Systems performance is analysed and compared for three different types of feature vectors. These types of features are generated using three different algorithms; Block Trunca...
Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remote Sensing Satellite and Evaluation of Cross Calibration Accuracy through Band-to-Band Data Comparisons
Accuracy evaluation of cross calibration through band-to-band data comparison for visible and near infrared radiometers which onboard earth observation satellites is conducted. The conventional cross calibration for visi...
BYOD Implementation Factors in Schools: A Case Study in Malaysia
The Bring Your Own Device (BYOD) initiative has been implemented widely in developed countries as a mechanism to prepare the students for the 4th industrial revolution. Success stories of the initiative vary depending on...