Analysis of user behavior and authorization methods in context of mobile devices security
This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.
user authentication; pattern lock; pin lock; android security; authorization methods
 Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
 Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
 Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
 J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
 Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
 Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
 Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
 Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
 M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.