Analysis of user behavior and authorization methods in context of mobile devices security
Piotr Król
piotrekk6@gmail.comInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)
Damian Marek
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)
Jakub Smołka
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)
Abstract
This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.
Keywords:
user authentication; pattern lock; pin lock; android security; authorization methodsReferences
[1] First Android Phone http://www.spinfold.com/first-android-phone/ [30.05.2017]
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
Król, P., Marek, D., & Smołka, J. (2018). Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute, 6, 34–41. https://doi.org/10.35784/jcsi.636
Authors
Piotr Królpiotrekk6@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland
Authors
Damian MarekInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland
Authors
Jakub SmołkaInstitute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland
Statistics
Abstract views: 241PDF downloads: 74
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.