Browse > Article
http://dx.doi.org/10.9717/kmms.2022.25.7.932

Design of Smartphone Secure Keypad Using Indirect Pattern  

Choi, Dongmin (Div. of Undeclared Majors, Chosun University)
Publication Information
Abstract
Smartphones, are currently equipped with high-performance hardware to process large amounts of data and provide most of the functions provided by desktop PCs. In addition, the smartphones enable quick user authentication through biometric information collected from embedded sensors. However, the biometric authentication method is sometimes rejected due to social and cultural environment, security vulnerabilities, and misrecognition rate. Thus, conventional authentication methods such as PIN and pattern authentication are still mainly used. Consider the latest foldable and bendable smartphones. These devices may be vulnerable to social engineering attacks as they use conventional authentication methods without considering their form factors. In this study, therefore, we propose an authentication method using partial elements of PIN and pattern authentication as a way to increase the security of the conventional authentication methods and consider the recent form factors. According to the performance evaluation results, our method provides improved safety compared to the conventional methods.
Keywords
Indirect PIN; Directional Information; Location Information;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Nayak and R. Bansode, "Analysis of Knowledge Based Authentication System Using Persuasive Cued Click Points," 7th International Conference on Communication, Computing and Virtualization 2016, pp. 553-560, 2016.
2 From Foldable Phones to Stretchy Screens (2020), https://spectrum.ieee.org/consumer-electronics/portable-devices/from-foldable-phones-to-stretchy-screens (accessed March 14, 2022).
3 M. Shahzad, A.X. Liu, and A. Samuel, "Secure Unlocking of Mobile Touch Screen Devices by Simple Gestures: You Can See It But You Can Not Do It," Proceeding of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39, 2013.
4 Y. Abdelrahman, M. Khamis, S. Schneegass, and F. Alt, "Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication," Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3751-3763, 2017.
5 A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J.M. Smith, "Smudge Attacks on Smartphone Touch Screens," Proceeding of USENIX Conference on Offensive Technologies, pp. 1-7, 2010.
6 Form factor (mobile phones)(2016), https://infogalactic.com/info/Form_factor_(mobile_phones) (accessed March 14, 2022).
7 E. Huitema, "The Future of Display Is Foldable," Information Display, Vol. 28, Issue 2-3, pp. 6-10, 2012.   DOI
8 Y. Jin and E. Yu, "An Evaluation of User Experience of Foldable Phones in Terms of Design Attributes and Proposed Future Design Directions," Journal of Integrated Design Research, Vol. 18, No. 4, pp. 63-80, 2019.
9 A.K. Kyaw, F. Sioquim, and J. Joseph, "Dictionary Attack on Wordpress: Security and Forensic Analysis," Proceedings of the 2nd International Conference on Information Security and Cyber Forensics, pp. 158-164, 2015.
10 E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R.R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints," Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, 2012.
11 J. Song, M. Jung, J. Choi, and S. Seo, "Proposal and Implementation of Security Keypad with Dual Touch," KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 3, pp. 73-80, 2018.   DOI
12 D. Choi, "Indirect PIN Entry Method for Mobile Banking Using Relation Location Information of Secret Code," Journal of Korea Multimedia Society, Vol. 23, No. 6, pp. 738-746, 2020.   DOI
13 C. Adams, "Personal Identification Number (PIN)," Encyclopedia of Cryptography and Security, pp. 927, 2011.
14 D. Choi, "A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods," Journal of Korea Multimedia Society, Vol. 24, No. 8, pp. 1076-1089, 2021.   DOI
15 W. Lee and R.B. Lee, "Multi-Sensor Authentication to Improve Smartphone Security," 2015 International Conference on Information Systems Security and Privacy, pp. 1-11, 2015.
16 X. Su, Z. Wang, X. Liu, C. Choi, and D. Choi, "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures," Security and Communication Networks, Vol. 2018, ArticleID 426934, pp. 1-14, 2018.
17 I. Kim, "Keypad against Brute Force Attacks on Smartphones," IET Information Security, Vol. 6, No. 2, pp. 71-76, 2012.   DOI
18 T. Takada, "Fake Pointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras," Proceeding of International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, 2008.
19 H. Seo, Z. Liu, G. Seo, T. Park, J. Choi, and H. Kim, "Open Sesame! Hacking the Password," Proceeding of 16th International Workshop on Information Security Applications, pp. 215-226, 2015.
20 H. Kim, H. Kwon, Y, Kwon, and H. Seo, "Proposal of Safe PIN Input Method on VR," Journal of the Korea Institute of Information and Communication Engineering, Vol. 23, No. 5, pp. 622-629, 2019.   DOI
21 C. Jung, Z. Dagvatur, R. Jang, D. Nyang, and K. Lee, "A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique," KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 5, pp. 127-136, 2018.   DOI
22 W. Guo, Y. Lee, and J. Chung, "Exploring Consumer Perception and Acceptance of Foldable Smartphone Using Text Mining: Focused on Galaxy Z Flip," Journal of Consumer Studies, Vol. 32, No. 4, pp. 59, 2021.