Skip to main content

Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2017)

Abstract

We aim at creating ease in authentication process through non-password-based authentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive technologies, that bring ease in patient’s daily life i.e. remote Electrocardiography and peripheral capillary oxygen saturation monitoring, remote blood glucose level monitoring applications etc. These assistive technologies are ubiquitous, seamless, immersed in the background, often remotely monitored, and the most intimate applications that run very close to the patient’s physiology. In this paper, we investigate the existing technologies and discover the trends to build Yet Another Authentication Method (YAAM). The YAAM is going to extract a distinctive image from a patient’s viewfinder and securely transform it into authentication token that are supported by the Geo-location, relative proximity of surrounding smart objects etc. that we call security-context. The authentication tokens are only generated on the fly when token context is right for the image stream captured by the wearable camera. The results presented in this paper not only present the pros and cons of the existing alternative authentication technologies, they also aide in the development of the YAAM prototype.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hlywa, M., Biddle, R., Patrick, S.A.: Facing the facts about image type in recognition-based graphical passwords. In: ACSAC 2011, pp. 149–158 (2011)

    Google Scholar 

  2. Kim, S.h., Kim, K.: A Simple Modeling Method for Mobile Password Schemes and Its Analysis, pp. 5–7 (2011)

    Google Scholar 

  3. Gao, H., Ma, L., Qiu, J., Liu, X.: Exploration of a Hand-Based Graphical Password Scheme pp. 143–150 (2011)

    Google Scholar 

  4. Bicakci, K., Oorschot, P.: A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. In: NSPW 2011, pp. 25–36 (2011)

    Google Scholar 

  5. Zakaria, N., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defense for recall-based graphical passwords. In: SOUPS 2011, p. 6 (2011)

    Google Scholar 

  6. Hayashi, E., Hong, J., Christin, N.: Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes. In: CHI 2011, pp. 2055–2064 (2011)

    Google Scholar 

  7. Khot, R., Srinathan, K., Kumaraguru, P.: MARASIM—a novel jigsaw based authentication scheme using tagging. In: CHI 2011, pp. 2605–2614 (2011)

    Google Scholar 

  8. Balasundaram, S.R.: Securing Tests in E-Learning Environment, pp. 2–5 (2011)

    Google Scholar 

  9. Yeole, A.S.: Proposal for Novel 3D Password for Providing Authentication in Critical Web Applications (Icwet), pp. 663–666 (2011)

    Google Scholar 

  10. Kim, S., Kim, J., Kim, S., Cho, H.: A new shoulder-surfing resistant password for mobile environments. In: ICUIMC 2011, pp. 27–37 (2011)

    Google Scholar 

  11. Spitzer, J., Singh, C., Schweitzer, D.: A security class project in graphical passwords. In: JoCSC 2010, pp. 7–13 (2010)

    Google Scholar 

  12. Stobert, E., Forget, A., Chiasson, S., Oorschot, P., Biddle, R.: Exploring usability effects of increasing security in click-based graphical passwords. In: ACSAC 2010, pp 79–88 (2010)

    Google Scholar 

  13. Dunphy, P., Heiner, A., Asokan, N.: A closer look at recognition- based graphical passwords on mobile devices. In: SPOUS 2010, pp. 3–13 (2010)

    Google Scholar 

  14. Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: The effect of baroque music on the PassPoints graphical password. In: CIVR 2010, pp. 129–134 (2010)

    Google Scholar 

  15. Forget, A., Chiasson, S., Biddle, R.: Input precision for gaze-based graphical passwords. In: CHI EA 2010, pp. 4279–4284 (2010)

    Google Scholar 

  16. Kim, D., Dunphy, P., Briggs, P., Hook, J., Nicholson, J., Nicholson, J., Olivier, P.: Multi-Touch Authentication on Tabletops, pp. 1093–1102 (2010)

    Google Scholar 

  17. Forget, A., Chiasson, S., Biddle, R.: Shoulder-Surfing Resistance with Eye-Gaze Entry in Cued-Recall Graphical Passwords, pp. 1107–1110 (2010)

    Google Scholar 

  18. Stobert, E.: Usability and strength in click-based graphical passwords. In: CHI EA 2010, pp. 4303–4308 (2010)

    Google Scholar 

  19. Renaud, K., Angeli, A.: Visual passwords-cure-all or snake-oil. Commun. ACM 52(12), 135 (2009)

    Article  Google Scholar 

  20. Chiasson, S., Forget, A., Stobert, E., Oorschot, P., Biddle, R.: Multiple password interference in text passwords and click-based graphical passwords. In: CCS 2009, pp. 500–511 (2009)

    Google Scholar 

  21. Renaud, K., Maguire, J.: Armchair Authentication, pp. 388–397 (2009)

    Google Scholar 

  22. Boit, A.: A Random Cursor Matrix to Hide Graphical Password Input, p. 60558 (2009)

    Google Scholar 

  23. Luca, A., Denzel, M., Hussmann, H.: Look into my eyes—can you guess my password. In: SOUPS 2009, pp 7–12 (2009)

    Google Scholar 

  24. Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI 2009), pp. 889–898 (2009)

    Google Scholar 

  25. Misbahuddin, M.: A user friendly password authenticated key agreement for multi server environment. In: ICAC 2003, pp. 113–119 (2009)

    Google Scholar 

  26. Srikanth, V.: Think-an image based CAPTCHA mechanism (testifying human based on intelligence and knowledge). In: Proceedings of ICAC3 2009, pp. 421–424 (2009)

    Google Scholar 

  27. Farmand, S.: An analytical study of 4-way recognition based sequence reproduction scheme in graphical password. UTM Thesis DB (2010)

    Google Scholar 

  28. Ray, P.: Ray’s scheme: graphical password based hybrid authentication system for smart hand held devices. In: JoIEA 2012, vol. 2, no. 2, pp. 1–11 (2012)

    Google Scholar 

  29. Oorschot, P.: System security, platform security and usability. In: STC 2010, pp. 1–2 (2010)

    Google Scholar 

  30. Zhang, Y., Monrose, F., Reiter, M.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: CCC 2010, pp. 176–186 (2010)

    Google Scholar 

  31. Shay, R., Komanduri, S., Kelley, P., Leon, P., Mazurek, M., Bauer, L., Christin, N., Cranor, L.: Encountering stronger password requirements-user attitudes and behaviors. In: SOUPS 2010, pp. 20–40 (2010)

    Google Scholar 

  32. Group, M.I.: Towards understanding ATM security a field study of real world ATM use. In: SOUPS 2010, pp. 16–26 (2010)

    Google Scholar 

  33. Flor, D.: Where do security policies come from. In: SOUPS 2010, pp. 10–24 (2010)

    Google Scholar 

  34. Beznosov, K., Inglesant, P., Lobo, J., Reeder, R., Zurko, M.: Usability meets access control-challenges and research opportunities. In: SACMAT 2009, pp. 73–74 (2009)

    Google Scholar 

  35. Silva, C.: A generic library for GUI reasoning and testing. In: SAC’19, pp. 121–128 (2009)

    Google Scholar 

  36. Avison, D., Fitzgerald, G.: Information Systems Development, Techniques and Tools International Edition. McGraw Hill, New York (2006)

    Google Scholar 

  37. Chapman, J.R., System development methodology. In: SIGCPR 2007, pp. 56–67 (2007)

    Google Scholar 

  38. Wakefield, T., Yeates, D.: System Analysis and Design, 2nd edn. Prentice Hall, Maldon (1994)

    Google Scholar 

  39. Maddison, R., Baker, G.: Feature Analysis of Five Information System Methodologies, pp. 277–306. Elsevier Science Publishers B.V., North Holland Press, Amsterdam (1984)

    Google Scholar 

  40. Boehm, B., Hansen, W.: Spiral Development, Experience Principles and Refinements (No. CMU/SEI-2000-SR-008). Carnegie Mellon Univ Pittsburgh Pa Software Engineering INST (2000)

    Google Scholar 

  41. Paetsch, F., Eberlein, A., Maurer, F.: Requirements engineering and agile software development. In: Enabling Technologies, Proceeding WET ICEI 2003, pp. 308–313 (2003)

    Google Scholar 

  42. Berger, H.: Agile development in a bureaucratic arena—a case study experience. JoIMgt 27(6), 386–396 (2007)

    Google Scholar 

  43. Ramsin, R., Taromirad, M.: CEFAM: comprehensive evaluation framework for agile methodologies. In: WISER 2004, pp. 37–44 (2008)

    Google Scholar 

  44. DSDM Consortium: DSDM and Changing Business Processes, Bringing People, Process and Technology Together (2006). Accessed 04 July 2017

    Google Scholar 

  45. Abrahamsson, P., Warsta, J, Siponen, J., Ronkainen, M.: New directions on agile methods: a comparative analysis. In: ICSE 2003, pp. 244–254 (2003)

    Google Scholar 

  46. Hawryszkiewycz, I.: Introduction to System Analysis and Design, 4th edn. Prentice Hall, Maldon (1998)

    Google Scholar 

  47. Burd, S., Jackson, R., Satzinger, J.: System Analysis and Design in a Changing World, Course Technology (2000)

    Google Scholar 

  48. Bennett, S., Skeleton, J., Lunn, K.: Shaum’s Outlines UML, 2nd edn, International Edition, McGraw Hill Education, New York (2005)

    Google Scholar 

  49. Gustafson, D.: Schaum’s Outline of Theory and Problems of Software Engineering. McGraw Hill, New York (2002)

    Google Scholar 

  50. Klein, D.: Foiling the cracker: a survey of, and improvements to password security. In: Proceedings of the USENIX UNIX Security Workshop, Portland, pp. 5–14 (1990)

    Google Scholar 

  51. Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, J., Memon, A.: PassPoints: design and longitudinal evaluation of a graphical password system. IJoHCS 63(1–2), 102–127 (2005)

    Google Scholar 

  52. Ku, W., Tsaur, M.: A remote user authentication scheme using strong graphical passwords. In: LCN 2005, pp. 351–357 (2005)

    Google Scholar 

  53. Blonder, G.: Graphical Passwords, United States patent 5559961 (1996)

    Google Scholar 

  54. Eljetlawi, A., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: ICCIT 2008, pp. 1137–1143 (2008)

    Google Scholar 

  55. Lai, H.L.: Cued recall graphical password system resistant to shoulder surfing. MS Thesis at Universiti Teknologi Malaysia (2013)

    Google Scholar 

  56. Eluard, M., Maetz, Y., Alessio, D.: Action-based graphical password: “Click-a-Secret”. In: ICCE 2011, pp. 265–266 (2011)

    Google Scholar 

  57. Gao, H., Ren, Z., Chang, X., Liu, X., Aickelin, U.: A new graphical password scheme resistant to shoulder-surfing. In: ICC 2010, pp. 194–199 (2010)

    Google Scholar 

  58. Wang, L., Chang, X., Ren, Z., Gao, H., Liu, X., Aickelin, U.: Against spyware using CAPTCHA in graphical password scheme. In: AINA 2010, pp. 760–767 (2010)

    Google Scholar 

  59. Martinez-Diaz, M., Fierrez, J., Martin-Diaz, C., Ortega-Garcia, J.: DooDB: a graphical password database containing doodles and pseudo-signatures. In: ICFHR 2010, pp. 339–344 (2010)

    Google Scholar 

  60. Zheng, Z., Liu, X., Yin, L., Liu, Z.: A stroke-based textual password authentication scheme. In: Education Technology and Computer Science, ETCS 2009, pp. 90–95 (2009)

    Google Scholar 

  61. Gao, H., Liu, X., Wang, S., Liu, H., Dai, R.: Design and analysis of a graphical password scheme, In: ICICIC 2009, pp. 675–678 (2009)

    Google Scholar 

  62. Alsulaiman, F.A., El Saddik, A.: Three-dimensional password for more secure authentication. IEEE Trans. Instrum. Meas. 57(9), 1929–1938 (2008)

    Article  Google Scholar 

  63. Lin, P.L., Weng, L.T., Huang, P.W.: Graphical passwords using images with random tracks of geometric shapes. In: CISP 2008, pp. 27–31 (2008)

    Google Scholar 

  64. Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yagp: yet another graphical password strategy. In: ACSAC 2008, pp. 121–129 (2008)

    Google Scholar 

  65. Farmand, S., Bin Zakaria, O.: Improving graphical password resistant to shoulder-surfing using 4-way recognition-based sequence reproduction (RBSR4). In: ICIME 2010, pp. 644–650 (2010)

    Google Scholar 

  66. Pering, T., Sundar, M., Light, J., Want, R.: Photographic authentication through untrusted terminals. Pervasive Comput. 2, 30–36 (2003)

    Article  Google Scholar 

  67. Yokota, K., Yonekura, T.: A proposal of COMPASS (community portrait authentication system). In: ICC 2005, pp. 367–389 (2005)

    Google Scholar 

  68. Chaudhry, J.: Self-Healing Systems and Wireless Networks Management, pp. 155–170. CRC Press, Boca Raton (2013)

    Book  Google Scholar 

  69. Padma, P., Srinivasan, S.: A survey on biometric based authentication in cloud computing. In: ICICT (2016)

    Google Scholar 

  70. Ozan, E.: Password-free authentication for social networks. In: CCWC 2017 (2017)

    Google Scholar 

  71. Islam, S.M.S., Bennamoun, M., Owens, R., Davies, R.: A review of recent advances in 3D ear and expression invariant face biometrics. ACM Comput. Surv. 14, 1–34 (2012)

    Article  Google Scholar 

  72. Chaudhry, J., Park, S.: AHSEN autonomic healing-based self management engine for network management in hybrid networks. In: GPC2007, pp. 193–203 (2007)

    Google Scholar 

  73. Chaudhry, J., Tariq, U., Amin, A., Rittenhouse, R.: Dealing with sinkhole attacks in wireless sensor networks. In: ASTL 2013 (2013)

    Google Scholar 

  74. Chaudhry, J., Chaudhry, S, Rittenhouse, R.: Phishing attacks and defenses. In: IJSA 2016 (2016)

    Google Scholar 

  75. Chaudhry, J., Qidwai, U., Rittenhouse, R., Lee, M.: Vulnerabilities and verification of cryptographic protocols and their future in wireless body area networks. ICET 2012, pp. 1–5 (2012)

    Google Scholar 

  76. Qidwai, U., Chaudhry, J., Shakir, M.: Ubiquitous monitoring system for critical cardiac abnormalities. In: EMBS 2012 (2012)

    Google Scholar 

  77. Movassaghi, M., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. Commun. Surv. Tutor. 16, 1658–1686 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junaid Chaudhry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Chaudhry, J., Farmand, S., Islam, S.M.S., Islam, M.R., Hannay, P., Valli, C. (2018). Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67071-3_29

  • Published:

  • Publisher Name: Edizioni della Normale, Cham

  • Print ISBN: 978-3-319-67070-6

  • Online ISBN: 978-3-319-67071-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics