Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks
Abstract
:1. Introduction
2. Method
2.1. Defining Research Questions and Objectives
- Comprehensively categorize and describe the current RBGP methods.
- Critically evaluate the susceptibility or robustness of these methods to SSAs.
- Explore the nuances of pass-objects utilized within these methods, emphasizing their role in either fortifying or undermining security against SSAs.
- Synthesize the findings to determine the overall efficacy of the RBGP methods in terms of both security against SSAs and user friendliness.
2.2. Identifying Information Sources
2.3. Developing the Search Strategy
2.4. Inclusion and Exclusion Criteria
2.5. Selecting Relevant Papers
2.6. Extracting Data
2.7. Synthesizing the Data
2.8. Identifying Research Gaps and Contributions
3. Results
3.1. Study Selection
3.2. RQ1: What Are the Existing Recognition-Based Methods?
3.2.1. Publications Years
3.2.2. Publication Sources
3.2.3. Publication Sources
3.3. RQ2: What Pass-Objects Are Used for Authentication in These Methods?
3.4. RQ3: What Are the Strengths and Weaknesses of the Selected Recognition-Based Methods?
- Prevalence: To the best of our knowledge, the three mentioned forms of SSA are among the most frequently reported and executed in real-life scenarios.
- Impact: These forms can significantly compromise the security of RBGP schemes if not adequately addressed.
- Feasibility for Attackers: The simplicity and ease with which these attacks can be carried out make them more probable compared to more complex or niche methods.
3.5. RQ4: How Effective Are the Selected Recognition-Based Methods in Terms of Security and Usability?
3.6. Study Taxonomy
4. Discussion
5. Conclusions
- Decoy and Registered Objects: Exploring the utility and effectiveness of decoy objects alongside registered ones in deterring SSAs.
- Reducing Login Time: Innovating methods that resist SSAs while also optimizing the speed of the login process.
- Adaptive Authentication: Investigating adaptive RBGP schemes that modify their challenge based on the perceived risk level of the authentication attempt.
- User Experience: Delving deeper into user perceptions and experiences with various RBGP methods to ensure that enhanced security does not detract from usability.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Faircloth, C.; Hartzell, G.; Callahan, N.; Bhunia, S. A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 501–507. [Google Scholar]
- Yang, G.C. Development Status and Prospects of Graphical Password Authentication System in Korea. KSII Trans. Internet Inf. Syst. 2019, 13, 5755–5772. [Google Scholar]
- Siddiqui, M.U.; Umar, M.S.; Siddiqui, M. A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme. In Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 14–15 December 2018; pp. 1–5. [Google Scholar]
- Gupta, S.; Sahni, S.; Sabbu, P.; Varma, S.; Gangashetty, S.V. Passblot: A highly scalable graphical one time password system. Int. J. Netw. Secur. Appl. 2012, 4, 201. [Google Scholar] [CrossRef]
- Wajid, A.; Ahmad, T.; Rafique, M. A Face Recognition and Graphical Password Based Hybrid Technique of Information Security. Pak. J. Sci. 2018, 70, 304. [Google Scholar]
- Authentication: Wikipedia. Available online: https://en.wikipedia.org/wiki/Authentication (accessed on 14 June 2023).
- Still, J.D.; Cain, A.A. Over-the-Shoulder Attack Resistant Graphical Authentication Schemes Impact on Working Memory. Adv. Intell. Syst. Comput. 2020, 960, 79–86. [Google Scholar]
- Addobea, A.A.; Li, Q.; Obiri, I.A., Jr.; Hou, J. Secure multi-factor access control mechanism for pairing blockchains. J. Inf. Secur. Appl. 2023, 74, 103477. [Google Scholar] [CrossRef]
- Authentication in an Internet Banking Environment: Federal Financial Institutions Examination Council. Available online: https://www.ffiec.gov/pdf/authentication_guidance.pdf (accessed on 17 June 2023).
- Binbeshr, F.; Kiah, M.M.; Por, L.Y.; Zaidan, A.A. A systematic review of PIN-entry methods resistant to shoulder-surfing attacks. Comput. Secur. 2021, 101, 102116. [Google Scholar] [CrossRef]
- Sinha, A.; Shrivastava, G.; Kumar, P.A. Pattern-Based Multi-Factor Authentication System. Scalable Comput. Pract. Exp. 2019, 20, 101–112. [Google Scholar]
- Alsaiari, H.; Papadaki, M.; Dowland, P.; Furnell, S. Graphical one-time password (GOTPass): A usability evaluation. Inf. Secur. J. A Global Perspective 2016, 25, 94–108. [Google Scholar] [CrossRef]
- Wang, H.; Xu, J.; Ma, M.; Zhang, H. A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs. Secur. Commun. Netw. 2018, 2018, 9482345. [Google Scholar] [CrossRef]
- Suo, X.; Zhu, Y.; Owen, G.S. Graphical passwords: A survey. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05), Tucson, AZ, USA, 5–9 December 2005. [Google Scholar]
- Jirjees, S.W.; Mahmood, A.M.; Nasser, A.R. Passnumbers: An approach of graphical password authentication based on grid selection. Int. J. Saf. Secur. Eng. 2022, 12, 21–29. [Google Scholar] [CrossRef]
- Carrillo-Torres, D.; Pérez-Díaz, J.A.; Cantoral-Ceballos, J.A.; Vargas-Rosales, C. A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations. Appl. Sci. 2023, 13, 1374. [Google Scholar] [CrossRef]
- Al-Ameen, M.N.; Wright, M.; Scielzo, S. Towards Making Random Passwords Memorable: Leveraging Users’ Cognitive Ability Through Multiple Cues. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing System, Seoul, Republic of Korea, 18–23 April 2015. [Google Scholar]
- Islam, A.; Por, L.Y.; Othman, F.; Ku, C.S. A Review on Recognition-Based Graphical Password Techniques. In Computational Science and Technology, Lecture Notes in Electrical Engineering; Alfred, R., Lim, Y., Ibrahim, A., Anthony, P., Eds.; Springer: Singapore, 2019. [Google Scholar]
- Por, L.Y.; Lim, X.T. Issues, threats and future trend for GSP. In Proceedings of the 7th WSEAS International Conference on Applied Computer & Applied Computational Science, Hangzhou, China, 6–8 April 2008. [Google Scholar]
- Dagvatur, Z.; Mohaisen, A.; Lee, K.; Nyang, D. Secure Human Authentication with Graphical Passwords. J. Internet Technol. 2019, 20, 1247–1259. [Google Scholar]
- Jaffar, J.A.; Zeki, A.M. Evaluation of Graphical Password Schemes in Terms of Attack Resistance and Usability. In Proceedings of the 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), Sakheer, Bahrain, 20–21 December 2020; pp. 1–5. [Google Scholar]
- Por, L.Y.; Kiah, M.L.M. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malays. J. Comput. Sci. 2010, 23, 121–140. [Google Scholar]
- Bošnjak, L.; Brumen, B. Shoulder surfing: From an experimental study to a comparative framework. Int. J. Hum.-Comput. St. 2019, 130, 1–20. [Google Scholar] [CrossRef]
- Khot, R.A.; Srinathan, K.; Kumaraguru, P. Marasim: A novel jigsaw based authentication scheme using tagging. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, Canada, 7–12 May 2011; pp. 2605–2614. [Google Scholar]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Rev. Panam. Salud Publica-Pan Am. J. Public Health 2022, 46, e112. [Google Scholar]
- Gokhale, M.A.S.; Waghmare, V.S. The shoulder surfing resistant graphical password authentication technique. Procedia Comput. Sci. 2016, 79, 490–498. [Google Scholar] [CrossRef]
- Por, L.Y.; Ku, C.S.; Islam, A.; Ang, T.F. Graphical password: Prevent shoulder-surfing attack using digraph substitution rules. Front. Comput. Sci. 2017, 11, 1098–1108. [Google Scholar] [CrossRef]
- Katsini, C.; Raptis, G.E.; Fidas, C.; Avouris, N. Does image grid visualization affect password strength and creation time in graphical authentication? In Proceedings of the 2018 International Conference on Advanced Visual Interfaces, Castiglione della Pescaia, Grosseto, Italy, 29 May–1 June 2018; p. 33. [Google Scholar]
- Sun, H.M.; Chen, S.T.; Yeh, J.H.; Cheng, C.Y. A shoulder surfing resistant graphical authentication system. IEEE Trans. Depend. Secur. 2018, 15, 180–193. [Google Scholar] [CrossRef]
- Othman, N.A.A.; Rahman, M.A.A.; Sani, A.S.A.; Ali, F.H.M. Directional Based Graphical Authentication Method with Shoulder Surfing Resistant. In Proceedings of the 2018 IEEE Conference on Systems, Process and Control (ICSPC), Melaka, Malaysia, 14–15 December 2018. [Google Scholar]
- Osunade, O.; Oloyede, I.A.; Azeez, T.O. Graphical User Authentication System Resistant to Shoulder Surfing Attack. Adv. Res. 2019, 19, 1–8. [Google Scholar] [CrossRef]
- Salman, M.; Li, Y.; Wang, J. A Graphical PIN Entry System with Shoulder Surfing Resistance. In Proceedings of the 2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP), Wuxi, China, 19–21 July 2019. [Google Scholar]
- Por, L.Y.; Adebimpe, L.A.; Idris, M.Y.I.; Khaw, C.S.; Ku, C.S. LocPass: A graphical password method to prevent shoulder-surfing. Symmetry 2019, 11, 1252. [Google Scholar] [CrossRef]
- Chu, X.; Sun, H.; Chen, Z. PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. In Proceedings of the International Conference on Financial Cryptography and Data Security, Kota Kinabalu, Malaysia, 14 February 2020; pp. 166–176. [Google Scholar]
- Nizamani, S.Z.; Hassan, S.R.; Shaikh, R.A.; Abozinadah, E.A.; Mehmood, R. A novel hybrid textual-graphical authentication scheme with better security, memorability, and usability. IEEE Access 2021, 9, 51294–51312. [Google Scholar] [CrossRef]
- ALSaleem, B.O.; Alshoshan, A.I. Multi-Factor Authentication to Systems Login. In Proceedings of the 2021 National Computing Colleges Conference (NCCC), Taif, Saudi Arabia, 27–28 March 2021. [Google Scholar]
- Gopali, S.; Sharma, P.; Khethavath, P.K.; Pal, D. HyPA: A Hybrid Password-Based Authentication Mechanism. In Proceedings of the Future of Information and Communication Conference, Vancouver, BC, Canada, 29–30 April 2022; pp. 651–665. [Google Scholar]
- Li, Y.; Yun, X.; Fang, L.; Ge, C. An Efficient Login Authentication System against Multiple Attacks in Mobile Devices. Symmetry 2021, 13, 125. [Google Scholar] [CrossRef]
- Kawamura, T.; Ebihara, T.; Wakatsuki, N.; Zempo, K. EYEDi: Graphical Authentication Scheme of Estimating Your Encodable Distorted Images to Prevent Screenshot Attacks. IEEE Access 2021, 10, 2256–2268. [Google Scholar] [CrossRef]
- Khodadadi, T.; Javadianasl, Y.; Rabiei, F.; Alizadeh, M.; Zamani, M.; Chaeikar, S.S. A Novel Graphical Password Authentication Scheme with Improved Usability. In Proceedings of the 2021 4th International Symposium on Advanced Electrical and Communication Technologies (ISAECT), Alkhobar, Saudi Arabia, 6–8 December 2021. [Google Scholar]
- Rajarajan, S.; Priyadarsini, P.L.K. SelfiePass: A Shoulder Surfing Resistant Graphical Password Scheme. In Proceedings of the 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), Bangalore, India, 27–28 August 2021. [Google Scholar]
- Jain, S.; Dabola, S.; Binjola, S.; Jindal, R. AlignPIN: Indirect PIN Selection for Protection Against Repeated Shoulder Surfing. In Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 28–29 January 2021; pp. 594–599. [Google Scholar]
- Harshini, M.; Sai, P.L.; Chennamma, S.; Reddy, A.G.; Kim, H.S. Easy-Auth: Graphical Password Authentication using a Randomization Method. In Proceedings of the 2021 IEEE Latin-American Conference on Communications (LATINCOM), Santo Domingo, Dominican Republic, 17–19 November 2021. [Google Scholar]
- Alfard, F.M.; Keshlaf, A.A.; Bouzid, O.M. IoTGazePass: A New Password Scheme for IoT Applications. In Proceedings of the 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering MI-STA, Tripoli, Libya, 25–27 May 2021; pp. 299–304. [Google Scholar]
- Kausar, N.; Din, I.U.; Khan, M.A.; Almogren, A.; Kim, B.S. GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices. Sensors 2022, 22, 1349. [Google Scholar] [CrossRef] [PubMed]
- Hasan, S.S.U.; Ghani, A.; Din, I.U.; Almogren, A.; Altameem, A. IoT devices authentication using artificial neural network. Comput. Mater. Contin. 2022, 70, 3701–3716. [Google Scholar]
- Wang, Z.; Liao, L.; Meng, R.; Yang, C.N.; Zhou, Z.; Yang, H. Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks. Secur. Commun. Netw. 2022, 2022, 6778755. [Google Scholar] [CrossRef]
- Sharna, S.A.; Ali, S.A. Image Based Password Authentication System. arXiv 2022, arXiv:2205.12352. [Google Scholar] [CrossRef]
- Adamu, H.; Mohammed, A.D.; Adepoju, S.A.; Aderiike, A.O. A Three-Step One-Time Password, Textual and Recall-Based Graphical Password for an Online Authentication. In Proceeding of the 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON), Lagos, Nigeria, 5–7 April 2022; pp. 1–5. [Google Scholar]
- Lapin, K.; Šiurkus, M. Balancing Usability and Security of Graphical Passwords. In Proceeding of the 9th Machine Intelligence and Digital Interaction Conference, Warsaw, Poland, 9–10 December 2021; pp. 153–160. [Google Scholar]
- Sani, S.I.A.; Alhassan, J.K.; Mohammed, A.S. Graphical Based Authentication Method Combined with City Block Distance for Electronic Payment System. In Illumination of Artificial Intelligence in Cybersecurity and Forensics; Misra, S., Arumugam, C., Eds.; Springer: Cham, Switzerland, 2022; pp. 289–323. [Google Scholar]
- Kaur, A.; Mustafa, K. Preference-Oriented Password-Based Authentication. In Proceeding of the Information and Communication Technology for Competitive Strategies (ICTCS 2020), Jaipur, India, 11–12 December 2022; pp. 953–965. [Google Scholar]
- Bostan, H.; Bostan, A. Shoulder surfing resistant graphical password schema: Randomized Pass Points (RPP). Multimed. Tools Appl. 2023, 1–25. [Google Scholar] [CrossRef]
Research Questions (RQ) | Research Objectives (RO) |
---|---|
RQ1: What are the existing recognition-based methods? | RO1: To identify the existing recognition-based methods. |
RQ2: What pass-objects are used for authentication in these methods? | RO2: To determine the pass-objects used for authentication in these methods. |
RQ3: What are the strengths and weaknesses of the selected recognition-based methods? | RO3: To examine the strengths and weaknesses of the selected recognition-based methods. |
RQ4: How effective are the selected recognition-based methods in terms of usability and security? | RO4: To evaluate the effectiveness of the selected recognition-based methods in terms of security and usability. |
Inclusion Criteria | Exclusion Criteria |
---|---|
Research studies that were published between 2016 and 2023 | Papers that do not focus on RBGP methods |
Papers that propose or deal with only RBGP schemes | Non-peer-reviewed papers |
Papers published in the English language | Papers published in languages other than English |
Peer-reviewed articles and conference papers |
Method | Pass-Objects | |||
---|---|---|---|---|
Registered Object | Decoy Object | Registered and Decoy Objects | None | |
Gokhale and Waghmare scheme [26] | √ | |||
Por et al. scheme [27] | √ | |||
3DGUA [28] | √ | |||
PassMatrix [29] | √ | |||
Othman et al. scheme [30] | √ | |||
PRGUARSS [31] | √ | |||
Salman et al. scheme [32] | √ | |||
LocPass [33] | √ | |||
PassPage [34] | √ | |||
Nizamani et al. scheme [35] | √ | |||
MFAS [36] | √ | |||
HyPA [37] | √ | |||
PinWheel [38] | √ | |||
EYEDi [39] | √ | |||
Khodadadi et al. scheme [40] | √ | |||
SelfiePass [41] | √ | |||
AlignPIN [42] | √ | |||
EASY-AUTH [43] | √ | |||
Alfard et al. scheme [44] | √ | |||
GRA-PIN [45] | √ | |||
Hasan et al. scheme [46] | √ | |||
VGMSGP [47] | √ | |||
Sharna and Ali scheme [48] | √ | |||
Adamu et al. scheme [49] | √ | |||
Lapin and Šiurkus scheme [50] | √ | |||
Sani et al. scheme [51] | √ | |||
Kaur et al. scheme [52] | √ | |||
RPP [53] | √ |
ID | Method | Author | Strengths | Weaknesses |
---|---|---|---|---|
S1 | Gokhale and Waghmare scheme | Gokhale and Waghmare [26] | It is simple to implement and has the potential to defend against shoulder-surfing attacks. | Vulnerable to multiple observations of shoulder-surfing attacks (MOSSAs). |
S2 | Por et al. scheme | Por et al. [27] | Capable of mitigating SSAs without weakening password strength. | Weak against observational attacks involving multiple sessions. |
S3 | 3DGUA | Katsini et al. [28] | Simple to operate. | Susceptible to direct observation attacks on account that the images that a user clicks on are the images that are registered. |
S4 | PassMatrix | Sun et al. [29] | Use the login indicator to mitigate the direct observation attack. | Open to potential compromises involving video recording and multiple observations. |
S5 | Othman et al. scheme | Othman et al. [30] | Capable of mitigating direct observation attacks using decoy images. | Vulnerable to MOSSAs and video-recorded shoulder-surfing attacks (VRSSAs). |
S6 | PRGUARSS | Osunade et al. [31] | Capable of mitigating direct observation attacks. | Susceptible to MOSSAs and VRSSAs because registered images are fixed and always connected with a line. |
S7 | Salman et al. scheme | Salman et al. [32] | Potential to protect against direct observation attacks. | Vulnerable to MOSSAs and VRSSAs. |
S8 | LocPass | Por et al. [33] | Potential to thwart SSAs. | The authentication time may be high due to the navigation involved. |
S9 | PassPage | Chu et al. [34] | Easy and convenient to use. | Susceptible to direct observation attacks on account that a user logs in with only the registered images. |
S10 | Nizamani et al. scheme | Nizamani et al. [35] | Use a pass-string to mitigate direct observation attacks. | Vulnerable to MOSSAs and VRSSAs because the system always selects and displays registered images. |
S11 | MFAS | Alsaleem and Alshoshan [36] | Potential to protect against keyloggers. | Susceptible to SSAs because an adversary can easily observe the code entered by the user and associate it with registered images. |
S12 | HyPA | Gopali et al. [37] | Easy and convenient to use with an alphanumeric password. | Susceptible to direct observation attacks on account that the images that a user clicks on are the images that are registered. |
S13 | PinWheel | Li et al. [38] | Capable of mitigating direct observation attacks. | Susceptible to SSAs if multiple authentication sessions are video recorded. |
S14 | EYEDi | Kawamura et al. [39] | Potential to prevent shoulder-surfing attacks using deformed images. | Vulnerable to SSAs because registered images would always appear in the same fixed locations. |
S15 | Khodadadi et al. scheme | Khodadadi et al. [40] | Straightforward to operate. | Extremely susceptible to SSAs on account that the images that a user clicks on are the registered images. |
S16 | SelfiePass | Rajarajan and Priyadarsini [41] | Use a secret token to thwart SSAs. | The user’s device may be in the possession of an adversary. |
S17 | AlignPIN | Jain et al. [42] | Thwart direct observation attacks. | Vulnerable to MOSSAs and VRSSAs. |
S18 | EASY-AUTH | Harshini et al. [43] | Easy and convenient to use. | Susceptible to direct observation attacks on account that the images that a user clicks on are the images that are registered. |
S19 | Alfard et al. scheme | Alfard et al. [44] | Employs eye gazing rather than direct clicking. | Vulnerable to MOSSAs and VRSSAs. |
S20 | GRA-PIN | Kausar et al. [45] | Capable of mitigating direct observation SSAs. | Vulnerable to MOSSAs and VRSSAs because the images used in a challenge set are always the same. |
S21 | Hasan et al. scheme | Hasan et al. scheme [46] | Potential to mitigate shoulder-surfing attacks. | Vulnerable to MOSSAs and VRSSAs. |
S22 | VGMSGP | Wang et al. [47] | It is difficult for potential adversaries to determine the registered points and the verification grid. | Vulnerable to MOSSAs and VRSSAs because a user would always map the same set of registered points into a specific verification grid. |
S23 | Sharna and Ali scheme | Sharna and Ali [48] | It is difficult for potential attackers to determine the key number required to login. | Susceptible to SSAs because an attacker can record the entire authentication process and then examine the images that are clicked in order to determine what number they correspond to. |
S24 | Adamu et al. scheme | Adamu et al. [49] | Uses an OTP for authentication. | Susceptible to direct observation attacks on account that the images that a user clicks on are the images that are registered. |
S25 | Lapin and Šiurkus scheme | Lapin and Šiurkus [50] | Potential to protect against brute force. | Susceptible to direct observation attacks on accounts that users login with only the registered images. |
S26 | Sani et al. scheme | Sani et al. [51] | It is difficult for the attackers to perfectly capture the clicked points. | Vulnerable to MOSSAs and VRSSAs. |
S27 | Kaur et al. scheme | Kaur et al. [52] | Capable of mitigating direct observation attacks. | Susceptible to MOSSAs and VRSSAs. |
S28 | RPP | Bostan and Bostan [53] | Potential to protect against SSAs. | Vulnerable to MOSSAs and VRSSAs. |
Method | Shoulder Surfing | Password Space Estimation | Login Time Comparison | |||||
---|---|---|---|---|---|---|---|---|
DO 1 | VR 2 | MO 3 | Password Length (n) | Password Space in (r) Rounds | Min Login Time (Seconds) | Max Login Time (Seconds) | Mean Login Time (Seconds) | |
Gokhale and Waghmare scheme [26] | Resist | × | × | n | 25!/(25 − n)! | × | × | × |
Por et al. scheme [27] | Resist | × | × | 2 | (25!/(25 − n)!) x r | 3.0 | 28.0 | 9.67 |
3DGUA [28] | × | × | × | 5 | 150!/(150 − n)! x r | × | × | × |
PassMatrix [29] | Resist | × | × | 1 | 77n x r | × | × | 31.31 |
Othman et al. scheme [30] | Resist | × | × | 4 | 9n x r | × | × | × |
PRGUARSS [31] | Resist | × | × | 5 | 70!/(70 − n)! | × | × | × |
Salman et al. scheme [32] | Resist | × | × | 1 | 40!/(40 − n)! | 22.0 | 29.75 | 22.33 |
LocPass [33] | Resist | Resist | Resist | n | 25r | 4.0 | 20.0 | 6.55 |
PassPage [34] | × | × | × | n | k!/(k − n)! | 20.0 | × | 27.12 |
Nizamani et al. scheme [35] | Resist | × | × | n | 118!/(118 − n)! | 13.14 | 40.16 | 20.84 |
MFAS [36] | × | × | × | 3 | 9!/(9 − n)! | × | × | × |
HyPA [37] | × | × | × | n | 9!/(9 − n)! | 2.7 | 3.5 | × |
PinWheel [38] | Resist | × | × | 2 | 36!/(36 − n)! | 8.0 | 17.0 | 14.0 |
EYEDi [39] | Resist | × | × | n | 25!/(25 − n)! | 34.7 | 110.0 | × |
Khodadadi et al. scheme [40] | × | × | × | 8 | 32!/(32 − n)! | × | × | × |
SelfiePass [41] | × | × | × | 2 | k!/(k − n)! | × | × | × |
AlignPIN [42] | Resist | × | × | 1 | 40!/(40 − n)! | 19.74 | 79.55 | 19.66 |
EASY-AUTH [43] | × | × | × | 3 | 9!/(9 − n)! | × | × | × |
Alfard et al. scheme [44] | Resist | × | × | 1 | 9!/(9 − n)! | × | × | × |
GRA-PIN [45] | Resist | × | × | n | k!/(k − n)! | × | × | × |
Hasan et al. scheme [46] | Resist | × | × | 2 | 10!/(10 − n)! | 5.8 | 12.37 | 8.23 |
VGMSGP [47] | Resist | × | × | n | k!/(k − n)! | 5.2 | 9.0 | × |
Sharna and Ali scheme [48] | × | × | × | 4 | k!/(k − n)! | × | × | × |
Adamu et al. scheme [49] | × | × | × | n | k!/(k − n)! x r | 46.0 | 82.0 | × |
Lapin and Šiurkus scheme [50] | × | × | × | 3 | k!/(k − n)! | × | × | × |
Sani et al. scheme [51] | Resist | × | × | 3 | 9!/(9 − n)! | × | × | × |
Kaur et al. scheme [52] | Resist | × | × | 2 | 16!/(16 − n)! | × | × | 11.0 |
RPP [53] | Resist | × | × | n | k!/(k − n)! | × | × | × |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Adebimpe, L.A.; Ng, I.O.; Idris, M.Y.I.; Okmi, M.; Ku, C.S.; Ang, T.F.; Por, L.Y. Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks. Appl. Sci. 2023, 13, 10040. https://doi.org/10.3390/app131810040
Adebimpe LA, Ng IO, Idris MYI, Okmi M, Ku CS, Ang TF, Por LY. Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks. Applied Sciences. 2023; 13(18):10040. https://doi.org/10.3390/app131810040
Chicago/Turabian StyleAdebimpe, Lateef Adekunle, Ian Ouii Ng, Mohd Yamani Idna Idris, Mohammed Okmi, Chin Soon Ku, Tan Fong Ang, and Lip Yee Por. 2023. "Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks" Applied Sciences 13, no. 18: 10040. https://doi.org/10.3390/app131810040
APA StyleAdebimpe, L. A., Ng, I. O., Idris, M. Y. I., Okmi, M., Ku, C. S., Ang, T. F., & Por, L. Y. (2023). Systemic Literature Review of Recognition-Based Authentication Method Resistivity to Shoulder-Surfing Attacks. Applied Sciences, 13(18), 10040. https://doi.org/10.3390/app131810040