DocumentCode :
110084
Title :
Keylogging-Resistant Visual Authentication Protocols
Author :
DaeHun Nyang ; Mohaisen, Aziz ; Kang, Jiawen
Author_Institution :
Sch. of Comput. & Inf. Eng., Inha Univ., Incheon, South Korea
Volume :
13
Issue :
11
fYear :
2014
fDate :
Nov. 2014
Firstpage :
2566
Lastpage :
2579
Abstract :
The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers (PCs) to observe user´s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users´ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.
Keywords :
computer network security; cryptographic protocols; data visualisation; microcomputers; PC untrusted devices; authentication attacks; keylogging resistant visual authentication protocols; one-time password protocol; password-based authentication protocol; personal computers; security design; security enhancement; security requirements satisfaction; user behavior; user experience; visualization design; Authentication; Keyboards; Protocols; Servers; Usability; Visualization; Authentication; keylogger; malicious code; smartphone;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2014.2307331
Filename :
6746187
Link To Document :
بازگشت