DocumentCode
110084
Title
Keylogging-Resistant Visual Authentication Protocols
Author
DaeHun Nyang ; Mohaisen, Aziz ; Kang, Jiawen
Author_Institution
Sch. of Comput. & Inf. Eng., Inha Univ., Incheon, South Korea
Volume
13
Issue
11
fYear
2014
fDate
Nov. 2014
Firstpage
2566
Lastpage
2579
Abstract
The design of secure authentication protocols is quite challenging, considering that various kinds of root kits reside in Personal Computers (PCs) to observe user´s behavior and to make PCs untrusted devices. Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. Therefore, relying on users to enhance security necessarily degrades the usability. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users´ trust. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. To that end, we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype of our protocols, we highlight the potential of our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.
Keywords
computer network security; cryptographic protocols; data visualisation; microcomputers; PC untrusted devices; authentication attacks; keylogging resistant visual authentication protocols; one-time password protocol; password-based authentication protocol; personal computers; security design; security enhancement; security requirements satisfaction; user behavior; user experience; visualization design; Authentication; Keyboards; Protocols; Servers; Usability; Visualization; Authentication; keylogger; malicious code; smartphone;
fLanguage
English
Journal_Title
Mobile Computing, IEEE Transactions on
Publisher
ieee
ISSN
1536-1233
Type
jour
DOI
10.1109/TMC.2014.2307331
Filename
6746187
Link To Document