Abstract
Most Android users today do not secure authentication layers when using their smartphone apps. Also, after utilizing the apps, users frequently do not log off. The risk of unauthorized access to the apps is high when the mobile phone is stolen or accidentally missing. This method of authentication is to prevent unauthorized access to the apps on the android platform and also from other attacks. A graphical password, also known as graphical user authentication, is a type of authentication that uses graphics instead of letters, numbers, or special characters. This paper discusses the implementation of graphical password authentication in the android platform, as well as the design and implementation of a system that integrates encrypted one-time passwords, encryption methods for one-time passwords, and existing graphical passwords. This technique of authentication uses a graphical password authentication system that has a combination of encrypted one-time password and image authentication to lock and unlock applications/apps on the android platform. The integration with the encrypted one-time password will be randomly generated by the server where it is valid only for one login session and after that, the session will be terminated. The system encrypts all passwords and important data using the AES algorithm even in the system’s database. This alternative technique is used to enhance the current authentication system by not only preventing data from being stolen but also securing it from shoulder surfing and man-in-the-middle attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
E. Sediyono, K.I. Santoso, Suhartono, Secure Login by Using One-Time Password Authentication Based on MD5 Hash Encrypted SMS (2013), https://ieeexplore.ieee.org/document/6637420. Accessed Sep 2021
R. Dhamija, A. Perrig, A user study using images for authentication, in Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, 14–17 Aug 2000
M. Shukran, M. Yunus, Maskat, Shariff, Ariffin, Pixel Value Graphical Password Scheme-Graphical Password Scheme Literature Review (2013), http://www.ajbasweb.com/old/ajbas/2013/March/688-695.pdf. Accessed Nov 2021
P.B. Maruthi, S. Rani, Recall Based Authentication System—An Overview (2017), http://www.ijastems.org/wp-content/loads/2017/03/v3.si1_.24. Accessed Sep 2021
A. Jermyn, F. Mayer, M. Monrose, Reiter, A. Rubin, The design and analysis of graphical passwords, in Proceedings of the 8th USENIX Security Symposium (1999), Washington, D.C., USA, 23–26 Aug 1999
B. Hamdane, A. Serhrouchni, S. Guemara, Using the HMAC-Based One-Time Password Algorithm for TLS Authentication (2016), https://ieeexplore.ieee.org/abstract/document/5931396. Accessed Sep 2021
V. Moraskar, S. Jaikalyani, M. Saiyyed, J. Gurnani, K. Pendke, Cued Click Point Technique for Graphical Password Authentication (2014). https://ijcsmc.com/docs/papers/January2014/V3I1201431.pdf. Accessed Nov 2021
C. Yoo, B.T. Kang, H.K. Kim, Case study of the vulnerability of OTP implemented in internet banking systems of South Korea (2015), https://springer.longhoe.net/article/10.1007/s11042-014-1888-3. Accessed Sep 2021
S. Hamdare, V. Nagpurkar, J. Mittal, Securing SMS Based One Time Password Technique from Man in the Middle Attack (2014), https://arxiv.org/abs/1405.4828. Accessed Nov 2021
Acknowledgements
I would like to thank all team members for their continued support and encouragement. This project could not have been accomplished without the support from UniKL and MARA for sponsoring the project. Finally, our excessive thanks to those who also cooperate in completing the project. It is our privilege that we had the opportunity to participate in this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Abdullah, N.Y., Anizam, I.S., Hamid, H.R.M.H., Ismail, W.H.W. (2024). Pass Matrix Based Graphical Password Authentication on the Android Platform. In: Ismail, A., Zulkipli, F.N., Mohd Daril, M.A., Öchsner, A. (eds) Applied Problems Solved by Information Technology and Software. SpringerBriefs in Applied Sciences and Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-47727-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-47727-0_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47726-3
Online ISBN: 978-3-031-47727-0
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)