instead of custom tokens enhances accessibility and
affordability. A lost or stolen USB drive can be easily
replaced by another USB drive with little intervention
needed from the system administrator.
The design of the system was guided by several
engineering standards, including FIPS 197, NIST SP
800-38A- 38G, ISO/IEC 27033, and GDPR. This
alignment makes the system suitable for deployment
in a wide range of contexts. However, a
comprehensive compliance analysis remains a
priority for future work.
Part of our future work will be directed towards
addressing the issues and challenges that were
observed during the deployment of the prototype.
From a hardware perspective, the scheme needs to be
tested over devices with various computation and
memory capacities to achieve optimal performance.
From a manufacturability perspective, USB drives are
known to have a relatively short lifespan. Alternative
token-based methods need to be evaluated. From a
system perspective, the current scheme does not
allow a user to reset the password at Authentication
Units. Secure methods to achieve this need to be
explored. Finally, although the security of the used
cryptographic functions is well established in the
literature, careful inspection needs to be given to their
implementation and configuration within the system.
REFERENCES
Adamu, H., Mohammed, A. D., Adepoju, S. A., &
Aderiike, A. O. (2022). A three-step one-time
password, textual and recall-based graphical password
for an online authentication. In 2022 IEEE Nigeria 4th
International Conference on Disruptive Technologies
for Sustainable Development (NIGERCON) (pp. 1–5).
Abraheem, A., Bozed, K., & Eltarhouni, W. (2022). Survey
of various graphical password techniques and their
schemes. In Proceedings of IEEE 2nd International
Maghreb Meeting of the Conference on Sciences and
Techniques of Automatic Control and Computer
Engineering (MI-STA) (pp. 105-110). doi: 10.1109/MI-
STA54861.2022.9837719.
Albayati, M. R., & Lashkari, A. H. (2014). A new graphical
password based on decoy image portions (GP-DIP). In
2014 International Conference on Mathematics and
Computers in Sciences and in Industry (pp. 295-298).
IEEE. doi: 10.1109/MCSI.2014.21.
Bijoy, J. M., Kavitha, V. K., Radhakrishnan, B., & Suresh,
L. P. (2017). A graphical password authentication for
analyzing legitimate user in online social network and
secure social image repository with metadata. In 2017
International Conference on Circuit, Power and
Computing Technologies (ICCPCT) (pp. 1–7). IEEE.
doi: 10.1109/ICCPCT.2017.8074325
Chaluvadi, N. S. S., Chitteti, L., Challa, L., & Srithar, S.
(2023). Improved arbitrary graphical password
authentication for web application safety. In 2023 5th
International Conference on Smart Systems and
Inventive Technology (ICSSIT) (pp. 714–720). IEEE.
doi: 10.1109/ICSSIT55814.2023.10060964
Dhamija, R., & Perrig, A. (2000). Deja Vu: A user study:
Using images for authentication. In Proceedings of the
9th USENIX Security Symposium. USENIX
Association.
Eljetlawi, A. M., & Ithnin, N. (2008). Graphical password:
Comprehensive study of the usability features of the
recognition base graphical password methods. In 2008
Third International Conference on Convergence and
Hybrid Information Technology (pp. 1137–1143).
IEEE. doi: 10.1109/ICCIT.2008.20.
Harisha, S. R., Naik, S. S., Vasudeva, K., Shrilakshmi, &
Kothwal, V. (2024). Advancements in user security:
Enhancing usability with graphical password
authentication. In 2024 2nd International Conference
on Intelligent Data Communication Technologies and
Internet of Things (IDCIoT) (pp. 454–460). IEEE. doi:
10.1109/IDCIoT59759.2024.10467993
Jansen, W. (2004). Authenticating mobile device users
through image selection. In Data Security.
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin,
A. D. (1999). The design and analysis of graphical
passwords. In Proceedings of the 8th USENIX Security
Symposium (pp. 1–14). USENIX Association.
Kawamura, T., Ebihara, T., Wakatsuki, N., & Zempo, K.
(2022). EYEDi: Graphical authentication scheme of
estimating your encodable distorted images to prevent
screenshot attacks. In IEEE Access, 10, 2256–2268.
https://doi.org/10.1109/ACCESS.2022.3145682
Khedkar, R., Pawar, A., Dharmale, K., Gaikwad, N., &
Kangane, A. (2024). A comprehensive survey of
graphical passwords authentication systems that
provides security. In 2024 International Conference on
Expert Clouds and Applications (ICOECA). IEEE. doi:
10.1109/ICOECA62351.2024.00036
Khodadadi, T., Javadianasl, Y., Rabiei, F., Alizadeh, M.,
Zamani, M., & Chaeikar, S. S. (2021). A novel
graphical password authentication scheme with
improved usability. In 2021 4th International
Symposium on Advanced Electrical and
Communication Technologies (ISAECT) (pp. 1–4).
IEEE. doi: 10.1109/ISAECT53699.2021.9668599.
Man, S., Hong, D., & Mathews, M. (2003). A shoulder-
surfing resistant graphical password scheme. In
Proceedings of the International Conference on
Security and Management. CSREA Press.
Mukerjee, A., Som, S., Khatri, S. K., & Mathur, A. (2019).
Enhancing remembrance of password as an image. In
2019 Amity International Conference on Artificial
Intelligence (AICAI) (pp. 198–203). IEEE. doi:
10.1109/AICAI.2019.8701296.
National Institute of Standards and Technology. (2001).
Recommendation for block cipher modes of operation:
Methods and techniques (NIST Special Publication