Abstract
The latest boom in the prevalence of smartphones has been encouraging various personal services to store and utilize important data such as photos and banking information. Thus, the importance of user authentication has also been growing rapidly. Nevertheless, many problems have arisen as a result of the common method of using a four-digit personal identification number (PIN) because of its potential for being breached by a brute force attack or shoulder-surfing attack. Various authentication schemes have been developed to overcome these problems. In this paper, we also propose a new password-based user authentication scheme that utilizes the well-known Minesweeper game, providing better usability as well as greater security. The proposed scheme provides its users a simple method for memorizing their passwords and usable security by allowing them to enter calculated values rather than the password itself.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Roth V, Richter K, Freidinger R (2004) A PIN-entry method resilient against shoulder surfing. In: Proceedings of the 11th ACM conference on computer and communications security, USA, pp 236–245
Park SB (2004) A method for preventing input information from exposing to observers. Patent application no.: 10-2004-0039209, Korea
MinInfo Co., http://www.mininfo.co.kr
Passfaces, http://www.passfaces.com
Yi JH, Kim T, Ma G, Yi H, Kim S (2012) Method and apparatus for authenticating password. Patent application no.: US 13/623,409
Kaye R (2000) Minesweeper is NP-complete. Math Intell 22:9–15
Olson JR, Olson GM (1990) The growth of cognitive modeling in human-computer interaction since GOMS. Hum Comput Interact 5:221–265
Lee S, Myung R (2009) Modified GOMS-model for mobile computing. J Soc Korea Ind Syst Eng 32:85–93
Acknowledgments
This work was supported by a grant from the KEIT funded by the Ministry of Knowledge Economy (10039180).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht(Outside the USA)
About this paper
Cite this paper
Kim, T., Kim, S., Yi, H., Ma, G., Yi, J.H. (2013). Mobile User Authentication Scheme Based on Minesweeper Game. In: Park, J., Ng, JY., Jeong, HY., Waluyo, B. (eds) Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 240. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6738-6_29
Download citation
DOI: https://doi.org/10.1007/978-94-007-6738-6_29
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6737-9
Online ISBN: 978-94-007-6738-6
eBook Packages: EngineeringEngineering (R0)