Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.12.525

A Study on the SmartPhone GPS based Graphical Password Approach  

Kim, Tae Eun (숭실대학교 컴퓨터학과)
Kim, Hyeon Hong (숭실대학교 컴퓨터학과)
Jun, Moon Seog (숭실대학교 컴퓨터학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.12, 2013 , pp. 525-532 More about this Journal
Abstract
Recently smartphones, tablet, etc. Various types of smart terminal is due to the increased security in mobile devices are becoming an issue. How to enter the password in this environment is a very important issue. Difficult to have a secure password input device on various types of mobile devices. In addition you enter on the touch screen the password of character, uncomfortable and it is vulnerable to SSA attack. Therefore, in this paper provide for defense the SSA(Shoulder Surfing Attacks) and useful password input mechanism is proposed with Smartphone GPS uses a value generated via a graphical password techniques.
Keywords
Mobile; Security; Graphical Password; Shoulder Surfing Attack; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sang-Jo Youk, Seung-Sun Yoo, Gil-cheol Park, and Tai-hoon Kim, "Design of Internet Phone (VoIP) for Voice Security using the VPN", International Journal of Multimedia and Ubiquitous Engineering, Vol.2, No.4, pp.55-66, 2007.
2 Seung Wook Jung, "CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone", International Journal of Security and Its Applications, Vol.6, No.3, pp.29-36, 2012.
3 Ali Fahmi Perwira Negara, Elyor Kodirov, Mohd Fikri Azli Abdullah, Deok-Jai Choi, Guee-Sang Lee and Shohel Sayeed, "Arm's Flex when Responding Call for Implicit User Authentication in Smartphone", International Journal of Security and Its Applications, Vol.6, No.3, pp.55-64, 2012.
4 Jin Baek Kim and Sungmin Kang, "A Study on the Factors Affecting the Intention to Use Smartphone Banking: The Differences between the Transactions of Account Check and Account Transfer", International Journal of Multimedia and Ubiquitous Engineering, Vol.7, No.3, pp.87-96, 2012.
5 I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter and A.D. Rubin, "The design and analysis of graphical passwords," Proceedings of the 8th USENIX Security Symposium, pp.1-14, 1999.
6 I.H. Jeng, D.R. Tsai, H.A. Chen, Y.C. Yen, and C.K. Cheng, "Touch sensitive alphanumeric encrypting PIN pad design based on hamilton connected subgraph recognition," Processing of International Conference on Intelligent Information Hiding and Multimedia Signal, pp.258-261, 2009.
7 J.Thorpe, P.C. van Oorschot, "Towards Secure Design Choices for Implementing Graphical Passwords", 2004.
8 H.Gao, Z.Ren, X.Chang, X.Liu, U.Aickelin Story-DAS, "A New Graphical Password Scheme Resistant to Shoulder-Surfing", International Conference on Cyberworlds, 2010.
9 PassFacesTM, "http://www.realuser.com", last accessed on Dec., 2011.
10 Rachna Dhamija, "Dejavu A User Study Using Images for Authentication", 2007.