CFP last date
22 April 2024
Reseach Article

MIRAGE 1.0: A Key Entry Scheme Resilient to Shoulder Surfing

by Chaitanya Srinadhu, Sree Kashyap Addanki, B.V.R.K. Ram Acharyulu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 1
Year of Publication: 2011
Authors: Chaitanya Srinadhu, Sree Kashyap Addanki, B.V.R.K. Ram Acharyulu
10.5120/3526-4804

Chaitanya Srinadhu, Sree Kashyap Addanki, B.V.R.K. Ram Acharyulu . MIRAGE 1.0: A Key Entry Scheme Resilient to Shoulder Surfing. International Journal of Computer Applications. 29, 1 ( September 2011), 47-53. DOI=10.5120/3526-4804

@article{ 10.5120/3526-4804,
author = { Chaitanya Srinadhu, Sree Kashyap Addanki, B.V.R.K. Ram Acharyulu },
title = { MIRAGE 1.0: A Key Entry Scheme Resilient to Shoulder Surfing },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 1 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 47-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number1/3526-4804/ },
doi = { 10.5120/3526-4804 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:40.952802+05:30
%A Chaitanya Srinadhu
%A Sree Kashyap Addanki
%A B.V.R.K. Ram Acharyulu
%T MIRAGE 1.0: A Key Entry Scheme Resilient to Shoulder Surfing
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 1
%P 47-53
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Two level authentication systems are widely being used in many ATM’s (automatic teller machine).To be more illustrative they are now crust of the security systems in many military agencies. It is very often noticed that, a combination of biometric and key login or a combination of token and a key are widely accepted authentication systems. Besides the problem of high faulty recognition, biometric suffers from a backdrop of high cost and slow authentication process. Like many of our valuable possessions tokens like magnetic cards are highly prone to theft and duplication. Traditional key entry schemes are very much vulnerable to peeping and shoulder surfing attacks. Furthermore, with the advancement of technology many other fake login schemes like dictionary attacks or key logging have become a major security concern. In this paper we propose pattern based key entry scheme, Mirage 1.0, which would not only withstand peeping and shoulder-surfing attacks but also would be resilient towards dictionary attacks and key logging schemes.

References
  1. Divyans Mahansaria, Samarpan Shyam, Anup Samuel, Ravi Teja, Massachusetts Institute of Technology. “A fast and secure software solution
  2. SS7.0 that counters shoulder surfing attack”. Proceedings of 13thIASTED International conference software engineering and application (SEA 2009), November 2-4,2009, Cambridge, MA, USA.
  3. M. Brader. Shoulder-surfing automated. Risks Digest, 19, 1998.
  4. G. A. Miller. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63:81–97, 1956.
  5. Shabih ul Hasan Naqvi, S. Afzal, S. “Operation code authentication”. Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference .9th july,2010.
  6. V. Roth, K. Richter, and R. Freidinger. A pin-entry method resilient against shoulder surfing. In Proc. of 11th ACM Conference on Computer and Communication Security (CCS 2004), pages 236–245,Washington DC, USA, October 2004. ACM Press.
  7. C. Summers and S. Toyne. Gangs preying on cash machines.BBC NEWS Online, Oct. 2003.
  8. D.Weinshall. Cognitive authentication schemes safe against spyware (short paper). In Proc. of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), pages 295–300, Berkeley/Oakland, California, USA, May 2006. IEEE Computer Society.
  9. ATMScam. Bank ATMs converted to steal bank customer ids. http://www.utexas.edu/police/alerts/atm scam/.
  10. M. Brader. Shoulder-surfing automated. Risks Digest, 19, 1998.
  11. V. Roth, K. Richter, and R. Freidinger. A pin-entry method resilient against shoulder surfing. In Proc. Of 11th ACM Conference on Computer and Communication Security (CCS 2004), pages 236–245,Washington DC, USA, October 2004. ACM Press.
  12. P. Shi, B. Zhu, and A. Youssef. A new pin entry scheme against recording-based shoulder-surfing. InProc. of 3rd International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009), Athens/Vouliagmeni, Greece, June 2009. IEEE Computer Society.
  13. E. K. Vogel and M. G. Machizawa. Neural activity predicts individual differences in visual working memory capacity. Nature, 428:748–751, April 2004.
  14. S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proc. of the working conference on Advanced visual interfaces (AVI 2006), pages 177–184, Venezia, Italy, May 2006. ACM Press.
  15. Peipei Shi, Bo Zhu and Amr Youssef. Concordia Institute for Information Systems Engineering. “A Rotary PIN Entry Scheme Resilient to Shoulder-Surfing.”. Internet Technology and Secured Transactions, 2009. ICITST 2009.
  16. T. Perkovic´, M. Cˇ agalj, N. Rakic´. Dept. of Electrical Engineering, FESB, University of Split. “SSSL: Shoulder Surfing Safe Login”. Software, Telecommunications & Computer Networks, 2009. SoftCOM 2009. 17th International Conference,26 sept,2009.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric authentication Key logging shoulder surfing MIRAGE 1.0