Advertisement

Investigating the Use of Gesture-Based Passwords by the Seniors

  • Lakshmidevi SreeramareddyEmail author
  • Pewu Mulbah
  • Jinjuan Heidi Feng
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9190)

Abstract

Older adults in the US are the fastest-growing demographic group, and also the fastest-growing group of internet users [1]. Many computer related tasks, such as user authentication, could be a challenge for the seniors as their cognitive and physical capabilities decline. To date, the most commonly used authentication method is alphanumeric passwords, which have substantial challenges regarding security and usability [2]. Authentication using traditional alphanumeric passwords can be particularly problematic for the seniors because secure passwords are usually hard to remember [3]. Therefore, due to memory loss, one common problem associated with aging, the traditional alphanumeric passwords could be challenging for the seniors to recall and manage. To address this challenge, we developed a gesture-based password application as an alternative to the traditional alphanumeric passwords [4]. Preliminary studies suggest that users could learn the new password method in fairly short amount of time [5]. In this paper, we report an empirical user study to investigate how the seniors interact with the gesture password application.

Keywords

Usable security and privacy User security and privacy by design Accessibility 

References

  1. 1.
    Hart, T.A., Chaparro, B.S., Halcomb, C.G.: Evaluating websites for older adults: adherence to ‘senior-friendly’ guidelines and end-user performance. Behav. Inf. Technol. 27, 191–199 (2008)CrossRefGoogle Scholar
  2. 2.
    Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. 44(4), 1–41 (2012)CrossRefGoogle Scholar
  3. 3.
    Renaud, K., Ramsay, J.: Now what was that password again? a more flexible way of identifying and authenticating our seniors. Behav. Inf. Technol. 26(4), 309–322 (2007)CrossRefGoogle Scholar
  4. 4.
    Sreeramareddy, L., Feng, J., Sears, A.: Poster: preliminary investigation of gesture-based password: integrating additional user behavioral features. In: Symposium on Usable Privacy and Security (SOUPS), pp. 4–5 (2012)Google Scholar
  5. 5.
    Sreeramareddy, L., Janprasert, A., Heidifeng, J.: Evaluating gesture-based password and impact of input devices. In: The International Conference on Security and Management (2014)Google Scholar
  6. 6.
    Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: YAGP: yet another graphical password strategy. In: 2008 Annual Computer Security. Applications Conference, pp. 121–129 (2008)Google Scholar
  7. 7.
    Adams, A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)CrossRefGoogle Scholar
  8. 8.
    Abdullah, M.D.H., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: 2008 Second Asia International Conference Modeling and Simulation, pp. 396–403 (2008)Google Scholar
  9. 9.
    Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of 8th USENIX Security Symposium, pp. 1–4 (1999)Google Scholar
  10. 10.
    Weiss, R., De Luca, A.: PassShapes - Utilizing Stroke Based Authentication to Increase Password Memorability, pp. 18–22 (2008)Google Scholar
  11. 11.
    Owen, G.S.: Graphical passwords: a survey. In: 21st Annu. Computer Security Applications Conference, (ACSAC), pp. 463–472 (2005)Google Scholar
  12. 12.
    Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV — Usability or Else!: Proceedings of HCI 2000, pp. 405–424. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  13. 13.
    Lashkari, A.H., Farmand, S., Zakaria, O.B., Saleh, R.: Shoulder surfing attack in graphical password authentication. Int. J. Comput. Sci. Inf. Secur. IJCSIS 6(2), 145–154 (2009)Google Scholar
  14. 14.
    Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of Seventh Symposium Usable Privacy and Security - SOUPS 2011, p. 1 (2011)Google Scholar
  15. 15.
    Nali, D., Thorpe, J.: Analyzing user choice in graphical passwords. School of Computer Science, Carleton University Technical report TR-04-01, pp. 1–6 (2004)Google Scholar
  16. 16.
    Varenhorst, C.: Passdoodles: a lightweight authentication method. MIT Res. Sci. Inst. (2004)Google Scholar
  17. 17.
    DeLuca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it’ s you! implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987–996 (2012)Google Scholar
  18. 18.
    Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 977–986 (2012)Google Scholar
  19. 19.
    Czaja, S.J., Lee, C.C.: The impact of aging on access to technology. Univers. Access Inf. Soc. 5(4), 341–349 (2007)CrossRefGoogle Scholar
  20. 20.
    Age Related Cognitive Decline. Life Extension Foundation for Long lIfe. http://www.lef.org/Protocols/Neurological/Age-Related-Cognitive-Decline/Page-01
  21. 21.
    CareMonitor, L.: Online Password Security Tips for Seniors, Senior Tech Daily. http://seniortechdaily.com/online-password-security-tips-for-seniors/
  22. 22.
    Anthony, L., Wobbrock, J.O.: A lightweight multistroke recognizer for user interface prototypes. In: Human- Computer Interaction Institute, Carnegie Mellon University (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Lakshmidevi Sreeramareddy
    • 1
    Email author
  • Pewu Mulbah
    • 1
  • Jinjuan Heidi Feng
    • 1
  1. 1.Department of Computer and Information SciencesTowson UniversityTowsonUSA

Personalised recommendations