Analysis of user behavior and authorization methods in context of mobile devices security


Abstract

This article discusses authentication methods for users of mobile devices with touchscreens. The analysis concerns the authentication methods already existing in Android OS and new authorization methods proposed by the authors. Pattern and PIN (Personal Identification Number) lock were compared with two new authentication methods. The time required for entering the key, number of mistakes, number of possible combinations were analyzed.


Keywords

user authentication; pattern lock; pin lock; android security; authorization methods

[1] First Android Phone http://www.spinfold.com/first-android-phone/ [30.05.2017]
[2] Number of smartphone users worldwide from 2014 to 2020 (in billions, https://www.statista.com/statistics/330695/number-of-smartphoneusers-worldwide/ [26.05.2017]
[3] Global market share held by smartphone operating systems from 2009 to 2016, https://www.statista.com/statistics/263453/ global-marketshare-held-by-smartphone-operating-systems// [26.05.2017]
[4] Taekyoung Kwon, Sarang Na, TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems, Graduate School of Information, Yonsei University, Seoul 120-749, Republic of Korea, 2013.
[5] J. Angulo, E. Wästlund, P. Gullberg, D. Kling, D. Tavemark, S.FischerHübner, Understanding the user experience of secure mobile online transactions in realistic contexts of use, 2012.
[6] Kwang Il Shin ,Ji Soo Park, Jae Yong Lee, Jong Hyuk Park, Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012.
[7] Hsin-Yi Chiang, Sonia Chiasson, Improving user authentication on mobile devices: A Touchscreen Graphical Password, 2013.
[8] Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock: The effect of pattern strength meter on pattern selection, 2014.
[9] Marte Dybevik Løge, Tell Me Who You Are and I Will Tell You Your Unlock Pattern, 2015.
[10] M. Bond, P. Zielinski Decimalisation table attacks for PIN cracking, 2013
Download

Published : 2018-03-30


Król, P., Marek, D., & Smołka, J. (2018). Analysis of user behavior and authorization methods in context of mobile devices security . Journal of Computer Sciences Institute, 6, 34-41. https://doi.org/10.35784/jcsi.636

Piotr Król  piotrekk6@gmail.com
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland  Poland
Damian Marek 
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland  Poland
Jakub Smołka 
Institute of Computer Science, Lublin University of Technology, Nadbystrzycka 36B, 20-618 Lublin, Poland  Poland