Abstract

The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the trends in computing devices and modern technologies drastically. With this revolution, there is a need to extend existing architectures of security to serve as the key protective feature in all computing devices. In this experimental study, the aim is to develop a novel authentication technique with a fusion of graphical doodle password approach and AR environments. The mash-up of both doodle passwords and AR in a 3D space gives a promising direction to set off to a modern, more usable, and satisfying authentication techniques. The proposed approach works on real-time size and coordinate matching of doodles in an AR environment for the authentication of users. The creation of doodle passwords in an AR space is carried on by touch-gesture-recognition on a smartphone. The usability and usefulness of the proposed technique is evaluated by conducting an extensive survey, based on tasks and user experience assessments. The randomized-post-test-only study model is used to conduct experimentation that is also followed by the analysis of security parameters with the help of confusion matrix. The obtained results predict the use of AR during the authentication process more satisfying for users, where the proposed technique is useful, usable, and secure in comparison to the existing authentication approaches. This paper also highlights the importance of research needed for the utilization of modern techniques during the creation of security frameworks.

Highlights

  • Authentication serves as a prime shield for computing devices and systems

  • Realizing the need for the integration of modern technologies with authentication schemes, this research proposes a new advancement in the existing authentication techniques by developing an innovative mechanism for authentication

  • The implementation of the proposed framework is such that a user creates a password in a 3D space by pressing the screen of a smartphone and moves it in the 3D space to draw a password

Read more

Summary

Introduction

Authentication serves as a prime shield for computing devices and systems. The ultimate goal for authentication is to identify between authorized and unauthorized access (either by entity or process). Strong authentication techniques and efficient access control models can help in better tracking and denial of unauthorized access for any smart devices or systems. Having said that users still risk their security mostly just because of inconvenient or less usable authentication methods [1], [41]. Difficult to compromise, and most importantly easy to use so that users can focus more on activities behind the authentication and not on the apparent authentication interface [4]. An authentication technique is useful only if it is fulfilling its primary purpose of security and is usable. According to [5], the cracking of passwords based on doodles is more difficult and are reliable and secure. The creation of various possibilities of the same doodle may exist but more in numbers in comparison to the text-based traditional password schemes. Text or PIN based passwords or pass-phrases always come from a language, such as English, and have the known number of digits, e.g., 4 Digit PIN etc., making it prone to dictionary attacks or brute force attacks

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.