Graphical and text based challenge questions for secure and usable authentication in online examinations
Author
Ullah, A.
Xiao, Hannan
Barker, T.
Lilley, M.
Attention
2299/15856
Abstract
In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach utilizes the widely used knowledge-based authentication mechanisms: login identifier and passwords and challenge questions. These approaches are reported with a number of benefits and limitations in term of usability and security. Previous studies suggests that the use of image-based graphical authentication may provide usable and secure solution. This paper presents the findings of an empirical study, utilizing a hybrid approach combining image and text-based challenge questions in a real online learning environment. A traffic light system was implemented to improve usability of the PBAF. The traffic light system relaxed authentication constraints for a significant number of users' attempts which would otherwise be penalized (p<; 0.01). An abuse case scenario was designed to assess the security of the PBAF method against impersonation attack. The number of participants in abuse case scenario was small, however, results demonstrate that participants were able to share both text-based and image-based questions for impersonation attack
Publication date
2014-12Published in
Procs 2014 9th Int Conf for Internet Technology and Secured Transactions (ICITST)Published version
https://doi.org/10.1109/ICITST.2014.7038825Other links
http://hdl.handle.net/2299/15856Metadata
Show full item recordRelated items
Showing items related by title, author, creator and subject.
-
Authenticity in the bureau-enterprise culture: the struggle for authentic meaning
Woods, Philip (2007)This article emphasises the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the ... -
Security and Usability of Authentication by Challenge Questions in Online Examination
Ullah, Abrar (2017-05-12)Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including ... -
Pass Phrase Based Speaker Recognition for Authentication
Hertlein, Heinz; Frischolz, Robert; Noth, Elmar (GI - Gesellschaft fur Informatik, 2003)Speaker recognition in applications of our daily lives is not yet in widespread use. In order for biometric technology to make sense for real-world authentication applications and be accepted by end users, convenience of ...