2019
DOI: 10.1109/access.2019.2918647
|View full text |Cite
|
Sign up to set email alerts
|

Draw It As Shown: Behavioral Pattern Lock for Mobile User Authentication

Abstract: Android pattern lock is still popularly used for mobile user authentication. Unfortunately, however, many concerns have been raised regarding its security and usability. User-created patterns tend to be simply structured or reduced to a small set. Complex patterns are hard to memorize. Input patterns are susceptible to various attacks, such as guessing attacks, smudge attacks, and shoulder surfing attacks. This paper presents a novel mechanism based on the pattern lock, in which behavioral biometrics are emplo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 42 publications
0
26
0
Order By: Relevance
“…Unlike these studies, the Quad Swipe Pattern is designed to be used as a gateway security protocol rather than a continuous authentication protocol. We find three works, specifically, Ku et al [19], Haberfeld et al [20], and Shahzad et al [26] who explore point-of-entry authentication using touch gestures like ours and eliminate the need for memorizing password, PIN, or passcode. Ku et al [19] explore open lock patterns, Haberfeld et al [20] explore open passcodes, and Shahzad et al [26] explore custom gestures.…”
Section: Our Studymentioning
confidence: 98%
See 1 more Smart Citation
“…Unlike these studies, the Quad Swipe Pattern is designed to be used as a gateway security protocol rather than a continuous authentication protocol. We find three works, specifically, Ku et al [19], Haberfeld et al [20], and Shahzad et al [26] who explore point-of-entry authentication using touch gestures like ours and eliminate the need for memorizing password, PIN, or passcode. Ku et al [19] explore open lock patterns, Haberfeld et al [20] explore open passcodes, and Shahzad et al [26] explore custom gestures.…”
Section: Our Studymentioning
confidence: 98%
“…Ku et al [19] explored open lock patterns for smartphone user authentication. With an open lock pattern, the pattern is displayed and the user log in by dragging his/her fingers over a 3 × 3 grid of dots following the displayed pattern.…”
Section: Related Literaturementioning
confidence: 99%
“…Several papers studied user identification on mobile devices based on motion sensor data [26][27][28][29][30][31][32][33][34][35]. Within the wide range of explored approaches, there are studies that perform user recognition based on voice and accelerometer signals [34], as well as studies that perform human movement tracking based on motion sensors [32].…”
Section: Authentication Based On Motion Sensorsmentioning
confidence: 99%
“…A complete analysis of our proposed biometric system is carried out regarding the discriminative power of each handwritten digit and the robustness when increasing the length of the password and the number of enrolment samples. Y. Ku et al [39] in this paper presents a novel mechanism based on the pattern lock, in which behavioral biometrics are employed to address these problems. basic idea starts from turning the lock pattern into public knowledge rather than a secret and leveraging touch dynamics.…”
Section: B Drawing Password Authenticationmentioning
confidence: 99%