Javascript must be enabled to continue!
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism
View through CrossRef
A variety of authentication mechanisms are used for online applications to protect user’s data. Prior literature identifies that
adults and children often utilize weak authentication practices and our own initial research corroborates that children often
create weak usernames and passwords. One reason children adopt weak authentication practices is due to difficulties in remembering
their usernames and passwords. Existing literature suggests that people are better at remembering graphical information than text
and words. In this dissertation, my research goal is to improve the usability and security of children’s authentication mechanisms.
My research includes designing, developing, and evaluating a new graphical user authentication mechanism for children where
children choose a sequence of pictures as their password. In our studies, this mechanism, named KidsPic, allowed
children (ages 6-11) to create and remember their passwords better than an alphanumeric password.
Usability studies identified areas needing further investigation with regards to usability and security. With regards to usability: we
investigated whether resolution influences picture selection, the influence of category order on memorability, if the number of objects in a picture
influences its selection, and if picture features like dominant colors influences picture selection. With regards to security: we
designed and implemented mechanisms to mitigate brute-force and shoulder surfing attacks. For guessing attacks, we conducted a usability study with child dyads. The results and analysis from these additional usability research objectives revealed no influence of picture resolution, order of picture categories, number of objects in each picture, and dominant colors on children choosing pictures for their password. The security research objectives resulted in design enhancements of KidsPic that mitigate bruteforce, shoulder surfing, and guessing attacks.
Title: Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism
Description:
A variety of authentication mechanisms are used for online applications to protect user’s data.
Prior literature identifies that
adults and children often utilize weak authentication practices and our own initial research corroborates that children often
create weak usernames and passwords.
One reason children adopt weak authentication practices is due to difficulties in remembering
their usernames and passwords.
Existing literature suggests that people are better at remembering graphical information than text
and words.
In this dissertation, my research goal is to improve the usability and security of children’s authentication mechanisms.
My research includes designing, developing, and evaluating a new graphical user authentication mechanism for children where
children choose a sequence of pictures as their password.
In our studies, this mechanism, named KidsPic, allowed
children (ages 6-11) to create and remember their passwords better than an alphanumeric password.
Usability studies identified areas needing further investigation with regards to usability and security.
With regards to usability: we
investigated whether resolution influences picture selection, the influence of category order on memorability, if the number of objects in a picture
influences its selection, and if picture features like dominant colors influences picture selection.
With regards to security: we
designed and implemented mechanisms to mitigate brute-force and shoulder surfing attacks.
For guessing attacks, we conducted a usability study with child dyads.
The results and analysis from these additional usability research objectives revealed no influence of picture resolution, order of picture categories, number of objects in each picture, and dominant colors on children choosing pictures for their password.
The security research objectives resulted in design enhancements of KidsPic that mitigate bruteforce, shoulder surfing, and guessing attacks.
Related Results
Daniela Fenu Foerch: interview by Márcia Fusaro and Ana Maria Haddad Baptista
Daniela Fenu Foerch: interview by Márcia Fusaro and Ana Maria Haddad Baptista
EccoS Journal: Dr Foerch thank you very much for this interview. Could you start telling us about your professional background and what the WeFEEL project is?
Daniela Fenu Foerch:...
Family Pediatrics
Family Pediatrics
ABSTRACT/EXECUTIVE SUMMARYWhy a Task Force on the Family?The practice of pediatrics is unique among medical specialties in many ways, among which is the nearly certain presence of ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Lapse kuvandist täiskasvanute ja laste endi pilgu läbi
Lapse kuvandist täiskasvanute ja laste endi pilgu läbi
The article analyses the image of the child as perceived from the perspective of children and adults and determines to what extent the perceptions vary between the children and adu...
“The Earth Is Dying, Bro”
“The Earth Is Dying, Bro”
Climate Change and Children
Australian children are uniquely situated in a vast landscape that varies drastically across locations. Spanning multiple climatic zones—from cool tempe...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract
Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...

