Analysis of user behavior and authorization methods in context of mobile devices security

Piotr Król

piotrekk6@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)

Damian Marek


Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)

Jakub Smołka


Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland (Poland)

Abstract

This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.


Keywords:

user authentication; pattern lock; pin lock; android security; authorization methods

[1] First Android Phone http://www.spinfold.com/first-android-phone/ [30.05.2017]
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
Download


Published
2018-03-30

Cited by

Król, P., Marek, D., & Smołka, J. (2018). Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute, 6, 34–41. https://doi.org/10.35784/jcsi.636

Authors

Piotr Król 
piotrekk6@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland

Authors

Damian Marek 

Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland

Authors

Jakub Smołka 

Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland Poland

Statistics

Abstract views: 230
PDF downloads: 69