Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2559206.2581187acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
poster

Vibrainput: two-step PIN entry system based on vibration and visual information

Published: 26 April 2014 Publication History

Abstract

Current standard PIN entry systems for mobile devices are not safe to shoulder surfing. In this paper, we present VibraInput, a two-step PIN entry system based on the combination of vibration and visual information for mobile devices. This system only uses four vibration patterns, with which users enter a digit by two distinct selections. We believe that this design secures PIN entry, and allows users to easily remember and recognize the patterns. Moreover, it can be implemented on current off-the-shelf mobile devices. We designed two kinds of prototypes of VibraInput. The experiment shows that the mean failure rate is 4.0%; moreover, the system shows good security properties.

Supplementary Material

ZIP File (wip0230-file3.zip)
Zip file containing a PDF of the Accompanying Poster

References

[1]
Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., and Moller, S. On the need for different security methods on mobile phones. MobileHCI '11, 465--473.
[2]
Bianchi, A., Oakley, I., Kostakos, V., and Kwon, D. S. The phone lock: audio and haptic shoulder-surfing resistant pin entry methods for mobile devices. TEI '11, 197--200.
[3]
De Luca, A., von Zezschwitz, E., and Hussmann, H. VibraPass: secure authentication based on shared lies. CHI '09, 913--916.
[4]
De Luca, A., von Zezschwitz, E., Pichler, L., and Hussmann, H. Using fake cursors to secure on-screen password entry. CHI '13, 2399--2402.
[5]
Roth, V., Richter, K., and Freidinger, R. A pin-entry method resilient against shoulder surfing. CCS '04, 236--245.
[6]
Sasamoto, H., Christin, N., and Hayashi, E. Undercover: authentication usable in front of prying eyes. CHI '08, 183--192.
[7]
Tan, D. S., Keyani, P., and Czerwinski, M. Spy-resistant keyboard: more secure password entry on public touch screen displays. OZCHI '05, 1--10.

Cited By

View all
  • (2021)Vibe: An Implicit Two-Factor Authentication using Vibration Signals2021 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS53000.2021.9705025(236-244)Online publication date: 4-Oct-2021
  • (2019)2GesturePIN: Securing PIN-Based Authentication on Smartwatches2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE.2019.00074(327-333)Online publication date: Jun-2019
  • (2019)Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile Feedback2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.000-3(151-156)Online publication date: Jun-2019
  • Show More Cited By

Index Terms

  1. Vibrainput: two-step PIN entry system based on vibration and visual information

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
    April 2014
    2620 pages
    ISBN:9781450324748
    DOI:10.1145/2559206
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2014

    Check for updates

    Author Tags

    1. authentication
    2. mobile devices
    3. privacy
    4. security

    Qualifiers

    • Poster

    Conference

    CHI '14
    Sponsor:
    CHI '14: CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2014
    Ontario, Toronto, Canada

    Acceptance Rates

    CHI EA '14 Paper Acceptance Rate 1,000 of 3,200 submissions, 31%;
    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 04 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Vibe: An Implicit Two-Factor Authentication using Vibration Signals2021 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS53000.2021.9705025(236-244)Online publication date: 4-Oct-2021
    • (2019)2GesturePIN: Securing PIN-Based Authentication on Smartwatches2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)10.1109/WETICE.2019.00074(327-333)Online publication date: Jun-2019
    • (2019)Efficient Shoulder Surfing Resistant PIN Authentication Scheme Based on Localized Tactile Feedback2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)10.1109/CSCloud/EdgeCom.2019.000-3(151-156)Online publication date: Jun-2019
    • (2019)Securing PIN‐based authentication in smartwatches with just two gesturesConcurrency and Computation: Practice and Experience10.1002/cpe.554932:18Online publication date: 16-Nov-2019
    • (2018)Improvements in a Puzzle Authentication MethodJournal of Computer and Communications10.4236/jcc.2018.6100206:01(12-20)Online publication date: 2018
    • (2018)Authentication systems: A literature review and classificationTelematics and Informatics10.1016/j.tele.2018.03.01835:5(1491-1511)Online publication date: Aug-2018
    • (2017)Dwell+Proceedings of the 30th Annual ACM Symposium on User Interface Software and Technology10.1145/3126594.3126627(5-16)Online publication date: 20-Oct-2017
    • (2017)A Gaze Gesture-Based User Authentication System to Counter Shoulder-Surfing AttacksProceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems10.1145/3027063.3053070(1978-1986)Online publication date: 6-May-2017
    • (2016)See you next timeProceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services10.1145/2935334.2935388(453-464)Online publication date: 6-Sep-2016
    • (2016)An observation attacks resistant PIN-entry scheme using localized haptic feedback2016 IEEE Region 10 Symposium (TENSYMP)10.1109/TENCONSpring.2016.7519378(59-64)Online publication date: May-2016
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media