Skip to main content
Log in

Usability and shoulder surfing vulnerability of pattern passwords on mobile devices using camouflage patterns

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the revolution of smart devices that have become the basis of our daily lives, the majority of users rely on them to save their personal and sensitive information. As a result, users are increasingly interested in authentication processes, which is a challenge for designers to provide a secure and usable authentication process. The pattern password is one of the most selected authentication methods, since the recent development in alternative authentication interfaces for smart phones, tablets and touch screens laptops. Although drawing a pattern seems easier than typing a password, it has a major security drawback which is the shoulder-surfing attack. Therefore, this paper proposes a shoulder-surfing resistance approach for mobile devices using Camouflage Patterns method which allows choosing a very short password, while insuring that the password remains hidden amongst a large number of nodes draws. Based on this approach, three techniques are introduced and implemented using an Android platform. An experimental study is conducted for evaluating the security and usability aspects. The results showed that the proposed approach is reasonably resistant against shoulder-surfing attacks and usable for users. Accordingly, this approach is recommended for designers in order to provide very simple and yet very complicated passwords, to be observed by the attacker, at the same time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Alsuhibany SA, Almutairi SG (2016) Making PIN and password entry secure against shoulder surfing using camouflage characters. Int J Comput Sci Inf Security 14:328

    Google Scholar 

  • Andriotis P, Tryfonas T, Oikonomou G, Yildiz C (2013) A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp 1–6

  • Anwar M, Imran A (2015) A comparative study of graphical and alphanumeric passwords for mobile device authentication. In MAICS, pp 13–18

  • Aviv AJ, Fichter D (2014) Understanding visual perceptions of usability and security of Android’s graphical password pattern. In Proceedings of the 30th Annual Computer Security Applications Conference, pp 286–295

  • Aviv AJ, Budzitowski D, Kuber R (2015) Is Bigger Better? Comparing User-Generated Passwords on 3 × 3 vs. 4 × 4 Grid Sizes for Android’s Pattern Unlock. In Proceedings of the 31st Annual Computer Security Applications Conference, pp 301–310&#8207

  • Biddle R, Chiasson S, Van Oorschot PC (2012) Graphical passwords: learning from the first twelve years. ACM Comput Surv 44:19

    Article  Google Scholar 

  • Brostoff S, Inglesant P, Sasse MA (2010) Evaluating the usability and security of a graphical one-time PIN system. In Proceedings of the 24th BCS Interaction Specialist Group Conference, pp 88–97

  • Chalkias K, Alexiadis A, Stephanides G (2006) A multi-grid graphical password scheme. In: Proceedings of the 6th International Conference on Artificial Intelligence and Digital Communications, Thessaloniki, Greece, pp 1–11

  • Chiang HY, Chiasson S (2013) Improving user authentication on mobile devices: a touchscreen graphical password. In: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pp 251–260

  • Chiasson S, Van Oorschot PC, Biddle R (2007) Graphical password authentication using cued click points. In European Symposium on Research in Computer Security, pp 359–374

  • Davis D, Monrose F, Reiter MK (2004) On User Choice in Graphical Password Schemes. In USENIX Security Symposium, 13:11–11

  • De Luca A, Hang A, Brudy F, Lindner C, Hussmann H (2012) Touch me once and i know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 987–996

  • Gao H, Guo X, Chen X, Wang L, Liu X (2008) Yagp: Yet another graphical password strategy. In Computer Security Applications Conference, pp. 121–129

  • Gao H, Ren Z, Chang X, Liu X, Aickelin U (2010) A new graphical password scheme resistant to shoulder-surfing. In International Conference on Cyberworlds, pp 194–199

  • Higashikawa S, Kosugi T, Kitajima S, Mambo M (2018) Shoulder-surfing resistant authentication using pass pattern of pattern lock. IEICE Trans Inf Syst 101:45–52

    Article  Google Scholar 

  • Ishizuka M, Takada T (2014) CCC: shoulder surfing resistant authentication system by using vibration. IPSJ Interaction, pp 501–503

  • Mohammedi M, Omar M, Bouabdallah A (2018) Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. J Ambient Intell Humaniz Comput 9(5):1527–1539

    Article  Google Scholar 

  • Nicholson J (2009) Design of a Multi-Touch shoulder surfing resilient graphical password. B.Sc in Information Systems. Newcastle University, Newcastle

    Google Scholar 

  • Oakley I, Bianchi A (2012) Multi-touch passwords for mobile device access. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp 611–612

  • Ruan O, Wang Q, Wang Z (2019) Provably leakage-resilient three-party password-based authenticated key exchange. J Ambient Intell Humaniz Comput 10:163–173

    Article  Google Scholar 

  • Schaub F, Deyhle R, Weber M (2012) Password entry usability and shoulder surfing susceptibility on different smartphone platforms. In Proceedings of the 11th international conference on mobile and ubiquitous multimedia, p. 13

  • Schaub F, Walch M, Könings B, Weber M (2013) Exploring the design space of graphical passwords on smartphones. In Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 11

  • Song Y, Cho G, Oh S, Kim H, Huh JH (2015) On the effectiveness of pattern lock strength meters: Measuring the strength of real world pattern locks. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp 2343–2352

  • Sun C, Wang Y, Zheng J (2014) Dissecting pattern unlock: the effect of pattern strength meter on pattern selection. J Inf Security Appl 19:308–320

    Google Scholar 

  • Tari F, Ozok A, Holden SH (2006) A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In Proceedings of the second symposium on Usable privacy and security, pp 56–66

  • Thorpe J, van Oorschot PC (2007) Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security Symposium, 8:1–8

  • Uellenbeck S, Dürmuth M, Wolf C, Holz T (2013) Quantifying the security of graphical passwords: the case of android unlock patterns. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security pp 161–172

  • Von Zezschwitz E, De Luca A, Janssen P, Hussmann H (2015) Easy to draw, but hard to trace?: On the observability of grid-based (un) lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp 2339–2342

  • Wiedenbeck S, Waters J, Sobrado L, Birget JC (2006) Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the working conference on Advanced visual interfaces, pp 177–184

  • Zakaria NH, Griffiths D, Brostoff S, Yan J (2011) Shoulder surfing defence for recall-based graphical passwords. In Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 6

Download references

Acknowledgements

The author gratefully acknowledges Qassim University, represented by the Deanship of Scientific Research, on the material support for this research under the number (3596-coc-2018-1-14-S) during the academic year 1439 AH/2018 AD.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suliman A. Alsuhibany.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alsuhibany, S.A. Usability and shoulder surfing vulnerability of pattern passwords on mobile devices using camouflage patterns. J Ambient Intell Human Comput 11, 1645–1655 (2020). https://doi.org/10.1007/s12652-019-01269-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01269-3

Keywords

Navigation