• DocumentCode
    110084
  • Title

    Keylogging-Resistant Visual Authentication Protocols

  • Author

    DaeHun Nyang ; Mohaisen, Aziz ; Kang, Jiawen

  • Author_Institution
    Sch. of Comput. & Inf. Eng., Inha Univ., Incheon, South Korea
  • Volume
    13
  • Issue
    11
  • fYear
    2014
  • fDate
    Nov. 2014
  • Firstpage
    2566
  • Lastpage
    2579
  • Abstract
    The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers (PCs) to observe user´s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users´ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.
  • Keywords
    computer network security; cryptographic protocols; data visualisation; microcomputers; PC untrusted devices; authentication attacks; keylogging resistant visual authentication protocols; one-time password protocol; password-based authentication protocol; personal computers; security design; security enhancement; security requirements satisfaction; user behavior; user experience; visualization design; Authentication; Keyboards; Protocols; Servers; Usability; Visualization; Authentication; keylogger; malicious code; smartphone;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2014.2307331
  • Filename
    6746187