Mobile User Authentication Scheme Based on Minesweeper Game

  • Taejin Kim
  • Siwan Kim
  • Hyunyi Yi
  • Gunil Ma
  • Jeong Hyun Yi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 240)

Abstract

The latest boom in the prevalence of smartphones has been encouraging various personal services to store and utilize important data such as photos and banking information. Thus, the importance of user authentication has also been growing rapidly. Nevertheless, many problems have arisen as a result of the common method of using a four-digit personal identification number (PIN) because of its potential for being breached by a brute force attack or shoulder-surfing attack. Various authentication schemes have been developed to overcome these problems. In this paper, we also propose a new password-based user authentication scheme that utilizes the well-known Minesweeper game, providing better usability as well as greater security. The proposed scheme provides its users a simple method for memorizing their passwords and usable security by allowing them to enter calculated values rather than the password itself.

Keywords

Password Usable security Authentication Shoulder-surfing attack 

Notes

Acknowledgments

This work was supported by a grant from the KEIT funded by the Ministry of Knowledge Economy (10039180).

References

  1. 1.
    Roth V, Richter K, Freidinger R (2004) A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM conference on computer and communications security, USA, pp 236–245Google Scholar
  2. 2.
    Park SB (2004) A method for preventing input information from exposing to observers. Patent application no.: 10-2004-0039209, KoreaGoogle Scholar
  3. 3.
  4. 4.
  5. 5.
    Yi JH, Kim T, Ma G, Yi H, Kim S (2012) Method and apparatus for authenticating password. Patent application no.: US 13/623,409Google Scholar
  6. 6.
    Kaye R (2000) Minesweeper is NP-complete. Math Intell 22:9–15Google Scholar
  7. 7.
    Olson JR, Olson GM (1990) The growth of cognitive modeling in human-computer interaction since GOMS. Hum Comput Interact 5:221–265Google Scholar
  8. 8.
    Lee S, Myung R (2009) Modified GOMS-model for mobile computing. J Soc Korea Ind Syst Eng 32:85–93Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht(Outside the USA) 2013

Authors and Affiliations

  • Taejin Kim
    • 1
  • Siwan Kim
    • 1
  • Hyunyi Yi
    • 1
  • Gunil Ma
    • 1
  • Jeong Hyun Yi
    • 1
  1. 1.School of Computer Science and EngineeringSoongsil UniversitySeoulKorea

Personalised recommendations