Secure bimodal PIN-entry method using audio signals
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Mun-Kyu | - |
dc.contributor.author | Nam, Hyeonjin | - |
dc.contributor.author | Kim, Dong Kyue | - |
dc.date.accessioned | 2021-08-02T17:31:18Z | - |
dc.date.available | 2021-08-02T17:31:18Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2016-02 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/24007 | - |
dc.description.abstract | A Personal Identification Number (PIN) is a multiple-digit sequence widely used for user authentication. It is desirable for a PIN-entry method to be secure against two main security threats, random guessing attacks and recording attacks. Although there have been many proposals for challenge-response-based PIN-entry methods, it is well known that the only way to prevent both attacks is to physically prevent attackers from observing the challenge response pairs, which motivates the development of PIN-entry methods that use secure secondary channels such as audio signals. To provide a guideline for designing an audio based PIN-entry method, we propose a simple framework to transform a non-audio-based method into an audio-based one. We also present a new PIN-entry method that improves the performance of this simple transformation. Most audio-based methods in the literature are unimodal methods, that is, they transmit almost all required information through an audio channel because it was believed that this approach maximized the user's performance. In this paper, however, we show that a carefully designed bimodal system may be more usable than a unimodal one. We present a new PIN-entry method whose audio channel only transmits the minimal required data while most of the challenge information is transmitted through the efficient visual channel. Our user study shows that the PIN-entry time of the proposed method is shorter than those of the previous audio-based methods, while its error rate is kept as low as that of the previous methods. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER ADVANCED TECHNOLOGY | - |
dc.title | Secure bimodal PIN-entry method using audio signals | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Dong Kyue | - |
dc.identifier.doi | 10.1016/j.cose.2015.06.006 | - |
dc.identifier.scopusid | 2-s2.0-84949111054 | - |
dc.identifier.wosid | 000370460300009 | - |
dc.identifier.bibliographicCitation | COMPUTERS & SECURITY, v.56, pp.140 - 150 | - |
dc.relation.isPartOf | COMPUTERS & SECURITY | - |
dc.citation.title | COMPUTERS & SECURITY | - |
dc.citation.volume | 56 | - |
dc.citation.startPage | 140 | - |
dc.citation.endPage | 150 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | Guessing attacks | - |
dc.subject.keywordPlus | Personal identification number | - |
dc.subject.keywordPlus | Shoulder surfing | - |
dc.subject.keywordPlus | Usability | - |
dc.subject.keywordPlus | User authentication | - |
dc.subject.keywordAuthor | User authentication | - |
dc.subject.keywordAuthor | Personal identification number (PIN) | - |
dc.subject.keywordAuthor | Usability | - |
dc.subject.keywordAuthor | Shoulder surfing attack | - |
dc.subject.keywordAuthor | Random guessing attack | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S0167404815000929?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.