Vous êtes sur la page 1sur 13

Awodele Oludele et al.

, AJCSA, 2017; 1:7

Research Article AJCSA (2017) Vol. 1, Issue 01

American Journal of Computer Sciences and Applications


(AJCSA)

Shoulder Surfing Resistant Graphical Authentication Scheme for


Web Based Applications
1
Prof. Awodele Oludele Ph.D., 2Kalesanwo Olamide, 3Kuyoro Afolashade PhD., 4Fowora
Damilola, 5Ariweriokuma Excellence.

1,2,3,4,5
School of Computing and Engineering Sciences, Babcock University, Ilishan Remo, Ogun
State, Nigeria.

ABSTRACT

Since the design and development of the first graphical authen- *Correspondence to Author:
tication pioneered by Blonder in 1996, numerous research has Kalesanwo Olamide
been conducted on this area to be used in different scenario School of Computing and En-
especially on the Internet. One of the major motivators is the pic- gineering Sciences, Babcock
ture superiority which as studies have shown, states that image/ University, Ilishan Remo, Ogun
pictures provides higher memorability as opposed to Text based State, Nigeria
authentication. However, graphical authentication is still faced
with some challenges. In this paper, a shoulder surfing resistant
graphical authentication scheme is proposed to tackle the major How to cite this article:
Awodele Oludele et al., Shoulder
issues related to the graphical authentication schemes devel-
Surfing Resistant Graphical Au-
oped. In summary, the proposed scheme provides a high level of
thentication Scheme for Web Based
resistance to shoulder surfing attacks, mitigating the need to up-
Applications. American Journal of
load pictures and aids in finding chosen objects in the scheme.
Finally, the schemes still have some vulnerabilities thus, con- Computer Sciences and Applica-

cluding that there cannot be a perfect graphical authentication tions, 2017; 1:7.

scheme; each scheme has its merits and demerits making it a


suitable candidate for different environment and/or event based
on its architecture.
eSciPub LLC, Houston, TX USA.

Keywords: Authentication, Text-based Authentication, Graphi- Website: http://escipub.com/


cal based Authentication, Security, Shoulder surfing.

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0001
Awodele Oludele et al., AJCSA, 2017; 1:7
based authentication schemes have been faced
1.0 Introduction
with numerous challenges including vulnerable
Graphical based authentication is a type of
to shoulder surfing attacks, the size of pictures
knowledge based authentication which uses
used and browsing through an array of
images/picture to assist users in generating a
images/objects without assistance (Biddle,
more robust password (Suo, Zhu & Owen,
Chiasson & Oorschot, 2011; Wiedenbeck,
2005). Due to its picture superiority which
Waters, Birget, Brodskiy & Memon, 2005). The
according to Paivio in 1991 claimed that pictures
proposed Graphical authentication schemes
are dually encoded and this is an advantage
reviewed in this paper tackles majorly on the
over words. While words are merely encoded
above-mentioned issues.
verbally, pictures produce both a verbal code
and an image code because participants are The rest of the paper is structured as follows:
more likely to hold a label for pictures than to firstly, a brief overview of Graphical based
imagine words. Having two types of codes authentication and it techniques, give examples
tagged to the pictures allow a greater chance of of the schemes that utilize the techniques of
retrieval during a memory task (Paivio 1991). In Graphical based authentication, listing its
addition, classic cognitive science experiment features, pros and cons, present the proposed
conducted have shown that humans have a scheme and its architecture, summary and
strong memory ability for images. The finally conclusion.
experiment showed a recognition performance
2.0 Graphical Based Authentication
exceeding 90%, indicating retention of over
Graphical based password authentication is a
2,000 items, even when up to 3 days elapsed
type of knowledge based authentication that
between learning and testing (Standing,
uses images or pictures in verifying the identity
Conezio, & Haber, 1970).
of a user. It is categorized generally into the
The challenge of users generating weak following: recognition-based, recall-based and
guessable passwords in text based cued recall techniques (Suo et al, 2005). Based
authentication has been one of the major on the various techniques, the steps for both
reasons numerous research has been registration and authentication varies.
conducted on Graphical based authentication
2.0.1 Recognition-Based technique
(Prakash, Infant & Shobana, 2010). The concept
This involves the recognition and selection of a
of Graphical based authentication is creating a
set (usually a fraction of the main set) of pre-
level of abstraction whereby users do not
selected objects (usually images) from a
actually know the set of password characters
portfolio of objects. One scheme that utilize this
generated but a pattern used in generating the
technique is:
passwords. However, over the years, Graphical

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0001
Awodele Oludele et al., AJCSA, 2017; 1:7

Figure 1.0: Colorlogin Source: Gao, Liu, Wang and Dai (2009)

ColorLogin by Gao et al utilizes recognition will be substituted with a lock icon. A user is
based technique involving choosing multiple authenticated after getting the pass icon in one
icons as password icons or pass-icons (Shown attempt else the icons will be shuffled for the
in Figure 1.0). The background of every icon user to try again. Using of colors and selecting
belongs to one of the finite set of colors given. of row improves the security against shoulder
Registration involves choosing a color which surfers. In this authentication, some icons are
then displays all the set of icons whose frequently chosen as pass icons creating so-
background color is the same as the chosen called hotspots and also searching through an
color. Users are required to choose 3 icons from array of icons can become tiring for the user.
the set of icons displayed. During authentication,
icons of different background colors including 2
of the users icons will be randomly displayed on 2.0.2 Recall-based or Pure recall technique

a grid. Users only need to select the row where This requires the user to reproduce something
the pass icon is located (no need to click on the that was created during registration; example
icon itself but any other icon on the same row includes:
with it) and after which all the icons on that row

Figure 1.1: Passdoodle Source: Varenhorst, Kleek and Rudolph (2004)

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0002
Awodele Oludele et al., AJCSA, 2017; 1:7
Varenhorst et al developed Pass-doodles in was observed that sometimes the users forget
2004 using recall based technique. It is a hand- the order in which they were drawn and also it
written design usually drawn with stylus unto tends to be vulnerable to shoulder surfing.
touch sensitive screen. A doodle in this case is
2.0.3 Cued recall technique
an ordered set of points which is drawn (Figure
Cued recall assist the user by providing a cue (a
1.1 is an example of a doodle) and saved during
clue or hint) to enable the user recall from
registration. In addition to the doodle drawn, the
memory and reproduce the information that was
speed used in drawing the doodle is also
created during registration. The following ae
calculated and saved. This graphical
some examples:
authentication scheme provides an easy way for
users to remember the pass-doodle drawn but it

Figure 1.2: Passblot login screen Source: Gupta, Sahni, Sabbu, Varma and Gangashetty
(2012)
Developed by Gupta et al in 2012, Passblot is a displayed for the user to describe. By randomly
graphical One-Time Password (OTP) that uses selecting a fraction of the users set of pictures
cued recall technique. The authentication upon login gives a dynamic password creating a
performs an inkblot test, a psychological probabilistic situation for dictionary attack and
evaluation to get the users unique description of brute force. Nevertheless, in other for the
an image (Carlson & Heth, 2010). Figure 1.2 module to be properly secured a large amount of
describes Passblot authentication. On inkblot pictures is required which is a load for the
registration, a given set of inkblots images are server and can be tiring for the user on
displayed; the first and last letter of the registration and authentication.
description of each inkblot is saved (i.e. if a
2.0.4 Hybrid technique
users description for a particular inkblot is
Over the years, in attempt to provide a more
butterfly then by is saved or if the description
secured graphical authentication system,
is standing man then sn is saved). All the
combinations of these techniques have been
displayed inkblots images have to be described
implemented. Examples of such systems
and saved for that particular user. Upon
includes:
authentication, a fraction of randomly chosen
inkblot images from the users set will be
Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0003
Awodele Oludele et al., AJCSA, 2017; 1:7

Figure 1.3: Graphical One Time Password Source: Alsaiari, Papadaki, Dowland and Furnell
(2016)
In 2016, Alsaiari et al developed Graphical One improves the ability to recall the pattern and
Time Password (GOTP) and as the name identify images more efficiently. Nevertheless, a
implies implements One-Time Password (OTP) reasonable amount of pictures need to be stored
mechanism for additional security. From Figure on the server for improved security which can be
1.3, this is a combination of three authentication a bottle neck for the server.
mechanisms which includes a 4x4 grid lock
3.0 Limitations of reviewed works
pattern (recall-based), identification of pass
From the works reviewed, many of the graphical
image (recognition-based) and finally inputting
authentication models developed are
an OTP corresponding to the chosen/identified
susceptible to shoulder attack which has been
images. The right OTP will be associated with
found to be one of the major challenges. The few
the correct images and it is also a challenge from
which are not susceptible requires a search
the server. On registration, a lock pattern is
through an array of objects which can be
drawn and a set of four (4) images out of thirty
demanding for the user and/or requires a
(30) are chosen. During authentication, the user
reasonable number of pictures (with lots of
first begins by drawing the lock pattern, next to
details) to be made secured which can be
selecting the right images (two of the previously
demanding in storing such unique images for
selected four) from the portfolio of images and
different users creating a burden for the server.
finally inputting a random number (i.e. one-time
Therefore, there is a need for a shoulder surfing
password if the right one is chosen) associated
resistant graphical authentication for web
with the selected images. This will be sent as a
applications which should require little number of
response to the server. This authentication
Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0004
Awodele Oludele et al., AJCSA, 2017; 1:7
images and little time to generate the graphical assigned to the rows and columns.
password. The concept of these unique rows,
columns and their intersection is
4.0 Proposed Scheme
gotten from the earths longitude and
This scheme utilizes set of colored rows and
latitude whose intersection is unique
columns which may assist users in identifying
and are used to provide co-ordinates.
their chosen cell. The interface design
(The Editors of Encyclopedia
elaborates on the cued recall graphical
Britannica, 2012). Every intersection
technique being utilized. This scheme will
of the coloured rows and column is
involve the following;
unique and its purpose is to assist in
i. Rows and Columns: As shown in locating a particular cell in the grid.
Figure 1.4, the grid is made of 13 Figure 3.1, shows the intersection
columns and 9 rows. From these rows between the white row (4) and red
and columns are 6 columns and 4 column (1); the format of this co-
rows that are assigned unique colours ordinate is written as (4,1). During
and values (these are all the even registration and authentication, these
rows and columns; the odd rows and coloured rows and columns are
column are not assigned any colour or randomly arranged on the grid but still
value). The values are permanently retain the values given to them.

Table 1.0: Colored columns and their associative value


Color Value
Red 1
Blue 2
Green 3
White 4
Yellow 5
Brown 6
Source: Researcher (2017)

Table 1.1: Colored rows and their associative value


Color Value
Red 1
Blue 2
Green 3
White 4
Source: Researcher (2017)

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0005
Awodele Oludele et al., AJCSA, 2017; 1:7

Figure 1.4: Unique rows, columns and their intersections Source: Researcher (2017)
The position/location of every cell in each giving the grid a total area of 650
the grid is relative to their by 450 pixels. The position/co-
neighbouring intersection as shown in ordinates of each cell is relative to the
Figure 1.5 (i.e. the cardinal points of individual intersections closet to them.
the intersection). Each cell contains As shown in Figure 1.5, A cell can be
two values (integers between 0 and in the North, North West, North East,
9). The first value (or left value) and East, South East, South West, South,
the second value (or right value). West or at the centre of an
These values are different from the intersection. All these positions are
values assigned to each line. assigned values and are used in
ii. Cells: There are a total number of 117 identifying the position/co-ordinates of
cells in the grid. Each cell in the grid a cell based on the unique intersection
has a width and height of 50pixels chosen.

Table 1.2: Cardinal Points and their associative values


Position Value
Centre 0
North 1
North East 2
East 3
South 4
South West 5
West 6
North West 7
Source: Researcher (2017)

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0006
Awodele Oludele et al., AJCSA, 2017; 1:7

Figure 1.5: Cells and their co-ordinates Source: Researcher (2017)


Co-ordinates of several cells are the green row (3) and brown column
shown in Figure 1.5. One of which is (6) and this co-ordinate is written as
the cell at the South West (SW - 7) (3,6,7).
position of the intersection between

Figure 1.6: The grid populated with pair of values in each cell Source: Researcher (2017)
Figure 1.6 shows the complete using JavaScript and its done during
interface used for the scheme. Each registration and authentication. As
cell contains a pair of value; a right shown in Figure 1.6, one of the co-
and a left. These pair of values are ordinates of a cell and the values it
randomly generated between 0 and 9 contains includes: the value of the

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0007
Awodele Oludele et al., AJCSA, 2017; 1:7
green row (3), value of the blue from one cell to another either from left
column (2), the position of the cell to right (or vice visa) or up to down (or
relative to the intersection of the vice visa).
chosen row and column (which in this This is done by pressing, holding and
example is the centre - 0), the left moving the left mouse button
value in the cell (3) and the right value anywhere within the grid. Moving the
in the cell (3) and this is written as mouse left or right will affect all the
(3,2,0,3,3). This form the complete right values in the cell causing them to
graphical password and will be stored move from one cell to another either
in the database during registration to the left or right position. On the
and be generated during other hand, moving the mouse up or
authentication. down will affect all the left values in the
iii. Inserting values into the cells: In cell causing them to move from one
this scheme, the use of the keyboard cell to another either upwards or
to insert the desired pair of values (i.e. downwards. For cells located at the
left and right values) is not allowed. In edge of the grid, new randomly
other to insert values, the user makes generated values will be moved into
use of only the mouse. As shown in the cell.
Figure 1.7, values are moved about

Figure 1.7: Moving values in the cell within the grid Source: Researcher (2017)

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0008
Awodele Oludele et al., AJCSA, 2017; 1:7
Both creating/setting up and generating of P = the position of the cell to the intersection of
password using this interface will be done as the chosen R and C, 0<=P<=8.
follows;
Le = the left value of the chosen cell, 0<=Le<=9
4.1 Creating/Setting up a graphical password and
This section explains the steps for
Ri = the right value of the chosen cell, 0<=Ri<=9.
creating/setting up a graphical password. These
steps are explained as follows: The co-ordinates includes (R,C,P) which
identifies the users chosen cell, while (Le,Ri) are
i. Select one coloured row.
the pair of values found in those co-ordinates
ii. Select one coloured column.
(chosen cell). The graphical password includes
iii. Select a cell whose location is relative
the combination of the co-ordinates and the pair
to the intersection of the chosen row
values which will be stored in the database. The
and column (i.e. a cell North, South,
co-ordinates will also be stored in the database
South-East, South-West, North-East,
to enable the authentication scheme know the
North West, West or East of the
users chosen cell in other to retrieve the inputted
intersection).
pair of value. The co-ordinates will be used for
iv. Press and drag the left mouse button
authentication.
up or down within the grid to move a
desired value into the first side (left 4.2 Generating a Graphical Password

side) of the chosen cell. This section explains the steps for generating a

v. Press and drag the left mouse button graphical password after creating/setting up a

left or right within the grid to move a password. In this phase, the co-ordinates stored

desired value into the second side for the registered use will be utilized in other to

(right side) of the chosen cell. know the users chosen cell and acquire the pair
of values in that cell. Every time during this
Here the password created will be (in this order),
phase, the order/arrangement of the unique
the value of the chosen row, the value of the
rows and columns are randomly placed, only the
chosen column, the position (in value) of the cell
user knows his/her chosen row, column, position
relative to the intersection, the chosen value for
(co-ordinates) and the pair of values to be
the first side (left side) and second side (right
inserted in to the chosen cell. This phase
side) of the chosen cell. The format is written as
includes the following:
(R,C,P,Le,Ri) Where:
i. By pressing and dragging the left
R = the value of the row chosen, 1<=R<=4. mouse button up or down within the
grid, assign the pre-chosen value for
C = the value of the column chosen, 1<=C<=6.

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 0009
Awodele Oludele et al., AJCSA, 2017; 1:7
the first side (left side) into the chosen the client side scripting and used for the
cell. development of the graphical interface for
ii. By pressing and dragging the left creating/setting up and generating
mouse button left or right within the password. In this project, it will be
grid, assign the pre-chosen value for performed both at the frontend framework
the second side (right side) into the and backend framework.
chosen. 4. WAMP Package: The acronym WAMP
iii. Proceeding to the next phase the stands for Windows Apache MySQL PHP
authentication scheme only validates and it is a software suite designed
the values located at the chosen cell specifically for Windows operating
as the scheme already knows the system. This suite creates a sandbox for
chosen cell. the development of web based
application which provides four key
4.3 System Development Tools
elements: An operating system,
This comprises of the tools that will be utilized to
database, web server and a scripting
design the graphical authentication scheme. The
software.
selection of these tools is required to provide a
Apache is the web server used to execute
robust, reliable and effective graphical
the different codes presented. MySQL is
authentication system. These tools include.
the type of database used during this
1. HTML (Hyper Text Mark-up Language): project. PHP (PHP Hypertext Pre-
This is a mark-up language that is used to processor) Perform at the backend, this
create and design the structure of the will be used to connect to the database
scheme. To achieve the grid system and serve as the server scripting
made of 117 cells, a table tag is created language.
containing 9 table row tags which in turn 5. PhpMyAdmin: This is a friendly interface
contains 13 table definition tags each. used to manage the activities of the
Each table definition (a cell) contain a database.
unique identity.
5.0 Summary
2. CSS (Cascading Style Sheets): This is
The architecture of the scheme provides
used for presentation and in this scheme,
different features to tackle the issues associated
provides each selected row and column
with reviewed existing graphical schemes.
its unique colour and styling.
These features include.
3. JavaScript: It plays a major role in this
research as it is responsible for 1. Shoulder surfing resistant: Firstly,
interacting with the user. This will perform during the process of inputting the chosen

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 00010
Awodele Oludele et al., AJCSA, 2017; 1:7
values into the chosen cells, every other image for authentication thereby
value is affected and move mitigating the need for picture uploads
simultaneously according to the and/or storage.
movement of the mouse. Secondly, 3. Assistance in finding objects: The
during every authentication, the coloured coloured rows and columns provides
rows and column are randomly placed assistance for users to locate the chosen
making the scheme dynamic. These cell for inputting the chosen pair of
features create a level of resistance to objects. Rather than searching through
shoulder surfing attacks. each cell, user focus on their chosen
2. Optimization of storage capacity: The coloured row and column. This
use of HTML (Hyper Text Mark-up streamlines the search.
Language), CSS (Cascading Style Sheet)
Using magic triangle evaluation, an evaluation
and JavaScript creates a dynamic table
scheme designed by Lashkari, Manaf, Masrom,
where are the coloured rows and columns
and Daud in 2011 which shows 3 attributes of
are rearranged during authentication.
security in Graphical authentication.
This dynamic grid system is used as the

Figure 1.8: Magic triangle for Graphical Authentication security evaluation Source:
Lashkari et al (2011)
The password space and entropy was For password space and
calculated using
Entropy = Nlog2(|L||O||C|)
SPACE = MN
Where
Where:
N = the length or number of runs,
M = is the number of characters and
L = locus alphabet as the set of all loci
N = is the length of the password (Lashkari et al,
O = is an object alphabet and
2011).

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 00011
Awodele Oludele et al., AJCSA, 2017; 1:7
C = color of the alphabet (Zhu, Qibin, Yong, & International Journal of Network Security & Its
Applications (IJNSA), 4(2).
Giusto, 2005).
6. Lashkari, A. H., Manaf, A. A., Masrom, M., &
The password space and entropy were shown to Daud, M. S. (2011). Security Evaluation for
Graphical Password. International Conference,
be 2.61*104 and 14.39 respectively. These DICTAP 2011, Proceedings, Part I. 166, pp. 431-
444. Dijion, France: Springer Heidelberg
results are verry low making it susceptible to
Dordrecht.
brute force attacks, therefore, an addition
7. Paivio, A. (1991). Dual coding theory: Retrospect
security feature should be added to this scheme and current status. Canadian Journal of
Psychology(45), 255-287.
against such attacks.
8. Prakash, M. V., Infant, P. A., & Shobana, S. J.
6.0 Conclusion (2010). Eliminating Vulnerable Attacks Using
One-Time Password and PassText Analytical
Several researches have been conducted on Study of Blended Schema. Universal Journal of
Graphical based authentication schemes, Computer Science and Engineering Technology,
1 (2), 133-140.
however, this area is still in its infancy. These
9. Standing, L., Conezio, J., & Haber, R. N. (1970).
scheme tackles security issues at the expense Perception and memory for pictures: Single-trial
of creating/ignoring other issues. This may be in learning of 2500 visual stimuli. Psychonomic
Science, 19(2), 7374. doi:DOI:
the security or usability area; however, 10.3758/BF03337426
something has always been found to be given up 10. Suo, X., Zhu, Y., & Owen, S. G. (2005). Graphical
Passwords: A Survey.
in other to resolve the issue. From the different
scheme reviewed, there is no perfect Graphical 11. The Editors of Encyclopedia Britannica. (2012,
July 3). Latitude and longitude. Retrieved April 5,
authentication scheme for all scenario. 2017, from Encyclopedia Britannica:
https://www.britannica.com/science/latitude
References
12. Varenhorst, C., Kleek, V. M., & Rudolph, L.
1. Alsaiari, H., Papadaki, M., Dowland, P., & Furnell, (2004). Passdoodles; a Lightweight
S. (2016). Graphical One-Time Password Authentication Method. Research Science
(GOTPass): A usability evaluation. Information Institute.
Security Journal: A Global Perspective. 13. Wiedenbeck, S., Waters, J., Birget, J.-C.,
doi:10.1080/19393555.2016.1179374 Brodskiy, A., & Memon, N. (2005). PassPoints:
2. Biddle, R., Chiasson, S., & Oorschot, P. (2011). design and longitudinal evaluation of a graphical
Graphical password: Learning from the first twelve password system. Int. J. Hum.-Comput. Stud. 63,
years. Technical Report TR-11-01,. 1-2, 102-127.

3. Carlson, N. R., & Heth, D. C. (2010). Psychology-


-the science of behaviour. Toronto: Person.

4. Gao, H., Liu, X., Wang, S., & Dai, R. (2009).


Design and Analysis of a Graphical Password
Scheme. Innovative Computing, Information and
Control (ICICIC). IEEE Xplore.
doi:10.1109/ICICIC.2009.158

5. Gupta, S., Sahni, S., Sabbu, P., Varma, S., &


Gangashetty, S. V. (2012). Passblot: A Highly
Scalable Graphical One Time Password System.

Http://escipub.com/american-journal-of-computer-sciences-and-applications/ 00012

Vous aimerez peut-être aussi