Date of Publication :10th November 2017
Abstract: Users typicalIy reuse the same personalized identification number(PIN) for muItiple systems and in numerous sessions. Direct PIN entries are highly susceptible to shoulder—surfing attacks as attackers can effectively observe PIN entry with concealed cameras. Indirect PIN entry methods proposed as counter measures are rarely deployed because they demand a heavier cognitive workload for users. To achieve security and usability, a practicaI indirect PIN entry method called SteganoPlN is presented. The human—machine interface of SteganoPlN is two numeric keypads, one covered and the other open, designed to physically block shoulder surfing attacks. After locating a long —term PIN in the more typical layout, through the covered permuted keypad, a user generates a one—time PIN that can safely be entered in plain view of attackers. Forty—eight participants were involved in investigating the PIN entry time and error rate of SteganoPlN. Our experimental manipulation used a within—subject factorial design with two independent variables: PIN entry system (standard PIN, SteganoPlN) and PIN type (system—chosen PIN, user— chosen PIN). The PIN entry time in SteganoPlN (5.4—5.7 s) was slower but acceptable, and the error rate (0—2. ° ) was not significantly different from that of the standard PIN. SteganoPlN is resilient to camera—based shoulder—surfing attacks over multiple authentication sessions. It remains limited to PIN —based authentication
Reference :
-
- Charles severance, "Eben upton: Raspberry pi", published by IEEE computer society, October 2013.
- Valeriu, Florin and Adrian-Viorel, Control System for Video Advertising Based on Raspberry Pi, 2014.
- http://codeduino.com/tutorials /arduino-vsraspberry-pi/news /hardware/arduino-vsraspberry-pi/
- http://www.zdnet.com/raspberry-pi-11 -reasonswhy-its-the-perfect-small -server-70000 206/
- J. Long and J. Wiles, No Tech Hacking: A 6u/de to Sac/ a/ Engineering,Dumpster Diving and Shoulder Surfing. Boston, MA, U : ng re . 2008.
- T. Kwon and J. Hong, "Analysis and improvement of a PIN entry method resilient to shoulder-surfing and recording attacks," IEEE Trans. Inf Forensics security, vol. 10, no. 2, pp. 278-292, Feb. 2015.