Ray's Scheme: Graphical Password Based Hybrid Authentication System For Smart Hand Held Devices
Ray's Scheme: Graphical Password Based Hybrid Authentication System For Smart Hand Held Devices
Ray's Scheme: Graphical Password Based Hybrid Authentication System For Smart Hand Held Devices
Rays Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
Partha Pratim Ray
Department of CSE, Surendra Institute of Engineering and Management Siliguri, West Bengal, India
Abstract Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, I have proposed a new hybrid graphical password based system. The system is a combination of recognition and pure recall based techniques and that offers many advantages over the existing systems and may be more convenient for the user. My approach is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart hand held devices (like smart phones i.e. PDAs, ipod, iphone, etc.) which are more handy and convenient to use than traditional desktop computer systems. Keywords smart phones, graphical passwords, authentication, network security
I. INTRODUCTION Security system plays an important role in the control of people in or out of protected areas, such as physical buildings, information systems, and our national borders. In order to that computer systems and the information associated to them should also be protected. Computer security systems should consider the human factors such as ease of a use and accessibility, in this context. Current secure systems suffer because they mostly ignore the importance of human factors in security (Dhamija 2000). An ideal security system considers all four items such as security, reliability, usability, and human factors. Passwords are simply secrets that are provided by the user upon request by a recipient. They are often stored on a server in an encrypted form so that a penetration of the file system does not reveal password lists (Authentication 2011). Passwords are the most common means of authentication which do not require any special hardware. Typically passwords are strings of letters and digits (alphanumeric). Such passwords have the disadvantage of being hard to remember (Sobrado 2002). Weak passwords are vulnerable to dictionary attacks and brute force attacks where as Strong passwords are harder to remember. To overcome the problems associated with password based authentication systems, the researchers have proposed the concept of graphical passwords and developed the alternative authentication mechanisms. Graphical passwords (GP) systems are the most promising alternative to conventional password based authentication systems. GP use pictures instead of textual passwords and are partially motivated by the fact that humans can remember pictures more easily than a string of characters (Elftmann 2006). The idea of GP was
originally described by Greg Blonder in 1996 (Blonder 1995). An important advantage of GP is that they are easier to remember than textual passwords. As human beings have the ability to remember faces of people, places they visit and things they have seen for a longer duration (theoretically until brain is strong). In this way graphical passwords provide a means for making more user-friendly passwords while increasing the level of security. Besides these advantages, the most common problem with GP is the shoulder surfing problem: an onlooker can steal users graphical password by watching in the users vicinity. Many researchers have attempted to solve this problem by providing different techniques (Xiayuan 2005). Due to this problem, most GP schemes recommend small hand held devices (PDAs) as the ideal application environment. Another common problem with graphical passwords is that it takes longer to input graphical passwords than textual passwords (Xiayuan 2005). The login process is slow and it may frustrate the impatient users. The exploitation of smart phones like ipod, iphone and PDAs is increased due to their small size, compact deployment and low cost. In this paper, considering the problems of text based password systems, I have proposed a novel graphical password scheme which has desirable usability for small hand held devices. My proposed system is new GP based hybrid system which is a combination of recognition and pure recall based techniques and consists of two phases. During the first phase called Registration phase, the user has to first select his username and a textual password. Then a number of objects are shown to the user to select from them as his graphical password. After selecting few objects, the user has to give digits (0-9) as same number as of the objects selected (one for each object). During the second phase called Authentication phase, the user has to give his username and textual password and then give his graphical password by selecting the objects shown and providing the digits in the same way as done during the registration phase. If digits are entered correctly the user is authenticated and only then he/she can access his/her account. For practical implementation of our system we have chosen i-mate JAMin smart phone which is produced by HTC, the Palm Pilot, Apple Newton, Casio Cassiopeia E-20 and others which allow users to provide graphics input to the device. It has a display size of 240x320 pixels. The implementation details are out of the scope of this paper. The structure of my paper is organized as follows. In section II, the classification of all existing authentication
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 235
III. CLASSIFICATION OF GP BASED SYSTEMS GP schemes can be broadly classified into four main categories. Detailed classification of systems involved in these four categories as follows: A. Recognition Based System which are also known as Cognometric Systems or Searchmetric Systems. Recognition based techniques involve identifying whether one has seen an image before. The user must only be able to recognize previously seen images, not generate them unaided from memory. The proposed works in this regards are summarized as below: Cognitive authentication (Weinshall 2006) Use your illusion (Hayashi 2008) Story (Davis 2004) Dj vu (Dhamija 2000) PassFace (Realusr 2011, Passfaces 2011) VIP (Angeli 2005, Moncur 2007) Photographic authentication (Pering 2003) Convex Hull Click (Wiedenbeck 2006) GPI/GPS (Bicakci 2009) Picture Password (Jasen 2003)
B. Biometric Based Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits (Biometric 2011). It uses physiological or behavioral characteristics like fingerprint or facial scans and voice recognition or iris to identify users. A biometric scanning device takes a user's biometric data, such as fingerprint scan, and converts it into digital information a computer can interpret and verify. Biometric identification depends on computer algorithms to make a yes/no decision. The different types of biometric authentication methods are as below. Contact metric technologies Finger print Hand/Finger geometry Dynamic signature verification Keystroke dynamics Facial recognition Voice recognition Iris scan Retinal scan
B. Pure Recall Based Systems which are also known as Drwanmetric Systems. In pure recall-based methods the user has to reproduce something that he or she created or selected earlier during the registration stage. Few works are given below: Android screen unlock (Tafasa 2011) GrIDsure (Gridsure 2011) PassShapes (Weiss 2008)
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 236
Passdoodle (Goldberg 2002, Varenhorst 2004) C. Cued Recall based systems which are also called Iconmetric Systems. In cued recallbased methods, a user is provided with a hint so that he or she can recall his his/her password. Several works are as below: Jiminys scheme (Renaud 2004, 2001) Suos scheme (Suo 2006) PassPoints (Wiedenbeck 2005, 2005, 2005) PassFace (Realusr 2011, Passfaces 2011) CCP (Chiasson 2007) PCCP (Chaisson 2008) Inkblot authentication (Stubblefield 2004) 3D scheme (Alsulaiman 2006) Passlogix (Passlogix 2011)
D. Hybrid systems which are typically the combination of two or more schemes. Like recognition and recall based or textual with graphical password schemes. The scheme is studied by researches as below: CDS (Gao 2010) Two Step Authentication (Oorschot 2009) GP based systems for small mobile devices (Khan 2011) My proposed system: Rays Scheme
IV. RELATED WORK (Khan 2011) proposed a scheme for small mobile devices which takes drawing as input in authentication phase. The input is given by mouse or stylus according to the objects (pictures) selected by user priori in registration phase. (Gao 2010) proposed and evaluated a new shoulder-surfing resistant scheme called Come from DAS and Story (CDS) which has a desirable usability for PDAs. It requires users to draw a curve across their password images (pass-images) orderly rather than click directly on them. This scheme adopts a similar drawing input method in DAS and inherits the association mnemonics in Story for sequence retrieval. It requires users to draw a curve across their password images (pass-images) orderly rather than click directly on them. The drawing method seems to be more compatible with peoples writing habit, which may shorten the login time. The drawing input trick along with the complementary measures, such as erasing the drawing trace,
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 237
with a stylus or a mouse or by hand. Digits given input by the user are stored in the database with his/her username. In object selection, each object can be selected any number of times as like for digits. Flow chart of registration phase is shown in Figure 3. During authentication phase, the user has to first give his username and textual password and then put digits pre-
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 238
VII. CONCLUSION The main element of computational trust is user identity. Currently lots of authentication methods and techniques are available but each of these has its own advantages and shortcomings. There is a growing interest in using pictures as passwords rather than text passwords but very little research has been done on graphical based passwords so far. In view of the above, I have proposed authentication system which is based on GP schemes. Although my system aims to reduce the problems with existing GP schemes but it has also some limitations and issues like all other graphical based password. I have proposed an authentication system which takes digits as password as selected for the pictures (objects) priori. Currently I am heading on implementation of my proposed system. In future, I will investigate the performance issues and user adaptability.
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 239
The design and analysis of graphical passwords, 8th USENIX Security Symposium. [28] Dunphy, P., and Yan, J. (2007), Do background images improve Draw a Secret graphical passwords?, 14th ACM Conference on Computer and Communications Security (CCS). [29] Tao, H. (2006), Pass-Go, a New Graphical Password Scheme, Master Thesis, University of Ottawa. [30] Gao, H., Guo, X., Chen, X., Wang, L., and Liu, X. (2008), YAGP: Yet another graphical password strategy, Annual Computer Security Applications Conference. [31] Orozco, M., Malek, B., Eid, M., and Saddik, A. E. (2006), Haptic-based sensible graphical password, Virtual Concept. [32] Goldberg, J., Hagman, J., and Sazawal, V. (2002), Doodling our way to better authentication, (student poster), ACM Conference on Human Factors in Computing Systems (CHI). [33] Varenhorst, C. (2004), Passdoodles: A lightweight authentication method, MIT Research Science Institute. [34] Renaud, K., and Angeli, A. D. (2004), My password is here! An investigation into visio-spatial authentication mechanisms, Interacting with Computers, 16(4):1017-1041. [35] Renaud, K., and Smith, E. (2001), Jiminy: Helping user to remember their passwords, Technical report, School of Computing, University of South Africa. [36] Suo, X. (2006), A design and analysis of graphical password, Master's thesis, College of Arts and Science, Georgia State University. [37] Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. (2005), Authentication using graphical passwords: Basic results, 11th International Conference International). on Human-Computer Interaction (HCI
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 240
[47] Man, S., Hong, D., Mathews, A. (2003), A shoulder surfing resistant graphical password scheme, International conference on security and management. AUTHORS PROFILE
password schema, IEEE International Conference on Virtual Environments: Human-Computer Interfaces and Measurement Systems. [44] Passlogix graphical password system. (2011), www.passlogix.com.
Partha Pratim Ray obtained Bachelor of Technology in computer science and engineering from the West Bengal University of Technology, Kolkata, West Bengal, India in the year 2008. He has recently completed Master of Technology in electronics and communication engineering with specialization in embedded systems in 2011 from the same University. The author has already published 6 research papers in various national and international journal and conference proceedings. He is currently an assistant professor in Computer Science and Engineering Department in Surendra Institute of Engineering and Management, Siliguri, Darjeeling, India. His interest includes in embedded systems and software, pervasive computing and wireless sensor network.
ISSN: 2231-2803
http://www.internationaljournalssrg.org
Page 241