Abstract: Information and computer security is supported largely by passwords which are the principle part of the authentication process.Authenticating by entering a PIN (numerical password) is the most common authentication technique these days. ATM, Mobile application passwords, POS terminals, electronic door access system, etc. mostly use PIN as their authenticating mechanism. As these passwords are to be typed in frequently and always in a hurry, their length is too small and hence, any person or camera can easily scan them and make a note of it. This makes it too unsecure as they are highly hack able. Shoulder surfing attack is the most common type of hacking attack among these types of hacks. The authentication system we are proposing here is resistant to.....
Key words: Authentication, shoulder surfing attack, graphical pin entry
[1]. J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes," in 2012 IEEE Symposium on Security and Privacy, May 2012, pp. 553–567.
[2]. M. Harbach, A. De Luca, and S. Egelman, "The anatomy of smartphone unlocking: A field study of android lock screens," in Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ser.CHI '16. New York, NY, USA: ACM, 2016, pp. 4806–4817.
[3]. J. Bonneau, S. Preibusch, and R. Anderson, "A birthday present every eleven wallets? the security of customer-chosen banking pins," in Financial Cryptography and Data Security, A. D. Keromytis, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 25–40.
[4]. M. Harbach, E. Von Zezschwitz, A. Fichtner, A. De Luca, and M. Smith,"It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception," in Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, ser. SOUPS'14. Berkeley, CA, USA:USENIX Association, 2014, pp. 213–230.
[5]. T. Kwon, S. Shin, and S. Na, "Covert attentional shoulder surfing: Human adversaries are more powerful than expected," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 44, no. 6, pp. 716–727,June 2014