Analysis of user behavior and authorization methods in context of mobile devices security
Article Sidebar
Open full text
Published:
Mar 30, 2018
Issue Vol. 6 (2018)
Articles
-
Comparison of web applications development using Spring MVC and Vaadin
Łukasz Tomczyk, Beata Pańczyk1-5
-
Comparison of web application development using PHP and Magento platforms
Bartosz Drawdzik, Maria Skublewska-Paszkowska6-11
-
An analysis of influence of safe programming techniques on applications efficiency and security
Tomasz Kobiałka12-19
-
The use of eye-tracking methods for evaluation of responsive web application
Dariusz Meksuła, Konrad Mikołajczyk, Małgorzata Plechawska-Wójcik, Magdalena Borys20-27
-
Efficiency comparison of mobile application frameworks for programming using internet technologies
Marcin Martyna, Jakub Smołka28-33
-
Analysis of user behavior and authorization methods in context of mobile devices security
Piotr Król, Damian Marek, Jakub Smołka34-41
-
Comparison of the configuration and capabilities of ORM libraries for Android
Tomasz Serwin42-46
-
Comparative analysis of selected skeletons for dependency injection
Rafał Szewczyk, Małgorzata Plechawska-Wójcik47-54
-
Comparison of GTK+ and Qt libraries in game development
Kamil Drzas, Dominik Alchimowicz, Maciej Pańczyk55-58
-
Blockchain technology and its application
Hlib Dikariev, Marek Miłosz59-61
-
Five ways to insert concurrency to a program written in C#
Paweł Szyszko, Jakub Smołka62-67
-
Analysis of the impact of development tools used on the performance of the mobile application
Paweł Kotarski, Kacper Śledź, Jakub Smołka68-72
-
Comparative analysis of online tools for management and communication in IT projects
Łukasz Naumiuk, Elżbieta Miłosz73-76
-
Performance comparison of an emulator and physical Android mobile device based on chess algorithm
Kamil Litkowski, Jakub Smołka77-81
-
Comparison of AngularJS and React.js frameworks based on a web application
Łukasz Capała, Maria Skublewska-Paszkowska82-86
-
Comparison of performance multi-platform application core on Android and Windows 10 Mobile.
Dawid Wieczorek, Jakub Smołka87-91
-
Comparison of capabilities to implement REST services in Java language using the popular web application frameworks.
Rafał Kwiatkowski, Piotr Kopniak92-96
-
ASP.NET MVC database applications performance
Paweł Borys, Beata Pańczyk97-101
Main Article Content
DOI
Authors
Piotr Król
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Damian Marek
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Jakub Smołka
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland, Poland
Abstract
This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.
Keywords:
user authentication; pattern lock; pin lock; android security; authorization methods
References
[1] First Android Phone http://www.spinfold.com/first-android-phone/ [30.05.2017]
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
Article Details
Król, P., Marek, D., & Smołka, J. (2018). Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute, 6, 34–41. https://doi.org/10.35784/jcsi.636
Abstract views: 330
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
