Advertisement

Patterns and Colors: A Simple yet Innovative Way to Solve Pattern Tracking

  • Abigail Achiamma Joshua
  • Samanza Kishwar Parvez
  • Weng Ken Lee
  • Ee Xion TanEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1132)

Abstract

Authentication is one of the essential defense mechanisms to prevent unauthorized access to our personal gadgets. Several authentication schemes have been proposed over the years, such as passwords, PIN and biometrics. Although there are many types of authentication methods equipped in our devices, they still have their limitations. This study compares the different types of commonly used knowledge-based authentication systems and identifies the shortcomings of these authentication methods by thoroughly exploring their vulnerabilities. In this study, we propose an innovative idea that modifies the existing pattern-lock authentication method by using a combination of patterns, colors and randomization to authenticate users to their mobile device. This proposed method can prevent unauthorized users from shoulder-surfing and analyzing the static repeated patterns drawn by users on their mobile devices.

Keywords

Pattern lock Authentication Salt and Hash cryptography 

Notes

Acknowledgment

This project has received funding from the Taylor’s University under the Taylor’s Internal Research Grant Scheme - Emerging Research Funding Scheme agreement no. TRGS/ERFS/1/2018/SOCIT/008.

References

  1. 1.
    About Face ID Advanced Technology. https://support.apple.com/en-my/HT208108. Accessed 01 May 2019
  2. 2.
    Aloul, F., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: IEEE/ACS International Conference on Computer Systems and Applications, pp. 641–644. IEEE (2009)Google Scholar
  3. 3.
    Soni, P., Sahoo, M.: Multi-factor authentication security framework in cloud computing. Int. J. Adv. Res Comput. Sci. Softw. Eng. 5, 1065–1071 (2015)Google Scholar
  4. 4.
    Srilekha, R., Jayakumar, D.: A secure screen lock system for android smart phones using accelerometer sensor. Int. J. Sci. Technol. Eng. 1(10), 96–100 (2015)Google Scholar
  5. 5.
  6. 6.
    Adarsh, S.: Implementation of color based Android shuffling pattern lock. Int. J. Comput. Sci. and Mob Comput. 5, 357–362 (2016)Google Scholar
  7. 7.
    Anwar, M., Imran, A.: A comparative study of graphical and alphanumeric passwords for mobile device authentication. In: Modern AI and Cognitive Science Conference, pp. 13–18 (2015)Google Scholar
  8. 8.
    Asha, S., Chellappan, C.: Biometrics: an overview of the technology, issues and applications. Int. J. Comput. Appl. 39, 35–52 (2012)Google Scholar
  9. 9.
    What is a Fingerprint Template? Webopedia Definition. https://www.webopedia.com/TERM/F/fingerprint_template.html. Accessed 01 May 2019
  10. 10.
    How Fingerprint Scanners Work: Optical, Capacitive, and Ultrasonic Variants Explained. https://www.androidauthority.com/how-fingerprint-scanners-work-670934/. Accessed 02 May 2019
  11. 11.
    Padma, B., Kumar, G.R.: A review on Android authentication system vulnerabilities. Int. J. Mod. Trends Eng. Res. 3, 118–123 (2016)CrossRefGoogle Scholar
  12. 12.
    Aviv, A.J., Gibson, K.L., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. In: USENIX 4th Workshop on Offensive Technology, pp. 1–7 (2010)Google Scholar
  13. 13.
    Ye, G., et al.: Cracking Android pattern lock in five attempts. In: Proceeding of ISOC NDSS (2017)Google Scholar
  14. 14.
    Zhang, J., et al.: Privacy leakage in mobile sensing: your unlock passwords can be leaked through wireless hotspot functionality. J. Mob. Inf. Sys. 2016, 1–14 (2016)Google Scholar
  15. 15.
    Abdelrahman, Y., Khamis, M., Schneegass, S., Alt, F.: Stay cool! Understanding thermal attacks on mobile-based user authentication. In: CHI Conference on Human Factors in Computing Systems, pp. 3751–3763. ACM (2017)Google Scholar
  16. 16.
    Pfleeger, C.P., Pfleeger, S.L., Margulies, J.: Security in Computing. Prentice Hall Professional Technical Reference, 5th edn. Prentice Hall, Upper Saddle River (2006)Google Scholar
  17. 17.
    Von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, pp. 261–270. ACM (2013)Google Scholar
  18. 18.
    Mayoral, F.: Instant Java Password and Authentication Security. Packt Publishing Ltd., Birmingham (2013)Google Scholar
  19. 19.
    How Many Combinations of Locking Pattern are Possible for a Samsung 3 * 3 Locking Grid. https://www.quora.com/How-many-combinations-of-locking-pattern-are-possible-for-a-Samsung-3*3-locking-grid. Accessed 02 May 2019
  20. 20.
    Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 1–6. ACM (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abigail Achiamma Joshua
    • 1
  • Samanza Kishwar Parvez
    • 1
  • Weng Ken Lee
    • 1
  • Ee Xion Tan
    • 1
    Email author
  1. 1.Taylor’s UniversitySubang JayaMalaysia

Personalised recommendations