Skip to main content

Mobile User Authentication Scheme Based on Minesweeper Game

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 240))

Abstract

The latest boom in the prevalence of smartphones has been encouraging various personal services to store and utilize important data such as photos and banking information. Thus, the importance of user authentication has also been growing rapidly. Nevertheless, many problems have arisen as a result of the common method of using a four-digit personal identification number (PIN) because of its potential for being breached by a brute force attack or shoulder-surfing attack. Various authentication schemes have been developed to overcome these problems. In this paper, we also propose a new password-based user authentication scheme that utilizes the well-known Minesweeper game, providing better usability as well as greater security. The proposed scheme provides its users a simple method for memorizing their passwords and usable security by allowing them to enter calculated values rather than the password itself.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Roth V, Richter K, Freidinger R (2004) A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM conference on computer and communications security, USA, pp 236–245

    Google Scholar 

  2. Park SB (2004) A method for preventing input information from exposing to observers. Patent application no.: 10-2004-0039209, Korea

    Google Scholar 

  3. MinInfo Co., http://www.mininfo.co.kr

  4. Passfaces, http://www.passfaces.com

  5. Yi JH, Kim T, Ma G, Yi H, Kim S (2012) Method and apparatus for authenticating password. Patent application no.: US 13/623,409

    Google Scholar 

  6. Kaye R (2000) Minesweeper is NP-complete. Math Intell 22:9–15

    Google Scholar 

  7. Olson JR, Olson GM (1990) The growth of cognitive modeling in human-computer interaction since GOMS. Hum Comput Interact 5:221–265

    Google Scholar 

  8. Lee S, Myung R (2009) Modified GOMS-model for mobile computing. J Soc Korea Ind Syst Eng 32:85–93

    Google Scholar 

Download references

Acknowledgments

This work was supported by a grant from the KEIT funded by the Ministry of Knowledge Economy (10039180).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeong Hyun Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht(Outside the USA)

About this paper

Cite this paper

Kim, T., Kim, S., Yi, H., Ma, G., Yi, J.H. (2013). Mobile User Authentication Scheme Based on Minesweeper Game. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6738-6_29

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6737-9

  • Online ISBN: 978-94-007-6738-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics