Show simple item record

dc.contributor.authorUllah, A.
dc.contributor.authorXiao, Hannan
dc.contributor.authorBarker, T.
dc.contributor.authorLilley, M.
dc.date.accessioned2015-04-28T08:34:08Z
dc.date.available2015-04-28T08:34:08Z
dc.date.issued2014-12
dc.identifier.citationUllah , A , Xiao , H , Barker , T & Lilley , M 2014 , Graphical and text based challenge questions for secure and usable authentication in online examinations . in Procs 2014 9th Int Conf for Internet Technology and Secured Transactions (ICITST) . Institute of Electrical and Electronics Engineers (IEEE) , pp. 302-308 , 9th Int Conf for Internet Technology and Secured Transactions (ICITST) , London , United Kingdom , 8/12/14 . https://doi.org/10.1109/ICITST.2014.7038825
dc.identifier.citationconference
dc.identifier.otherPURE: 8442092
dc.identifier.otherPURE UUID: ba65eb4f-5493-46c5-bfde-5ab5ed61e6cd
dc.identifier.otherBibtex: urn:fa014b9cb41a48f5d4b56a3f93d31aac
dc.identifier.otherScopus: 84949923020
dc.identifier.otherORCID: /0000-0003-2273-6679/work/32373810
dc.identifier.urihttp://hdl.handle.net/2299/15856
dc.description.abstractIn traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors developed and implemented a Profile Based Authentication Framework (PBAF) with the aim to integrate learning and examination processes for secure online examinations. The PBAF approach utilizes the widely used knowledge-based authentication mechanisms: login identifier and passwords and challenge questions. These approaches are reported with a number of benefits and limitations in term of usability and security. Previous studies suggests that the use of image-based graphical authentication may provide usable and secure solution. This paper presents the findings of an empirical study, utilizing a hybrid approach combining image and text-based challenge questions in a real online learning environment. A traffic light system was implemented to improve usability of the PBAF. The traffic light system relaxed authentication constraints for a significant number of users' attempts which would otherwise be penalized (p<; 0.01). An abuse case scenario was designed to assess the security of the PBAF method against impersonation attack. The number of participants in abuse case scenario was small, however, results demonstrate that participants were able to share both text-based and image-based questions for impersonation attacken
dc.format.extent7
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartofProcs 2014 9th Int Conf for Internet Technology and Secured Transactions (ICITST)
dc.subjectauthorisation
dc.subjectcomputer graphics
dc.subjectknowledge based systems
dc.subjectlearning (artificial intelligence)
dc.subjectPBAF approach
dc.subjectface-to-face interaction
dc.subjectgraphical challenge questions
dc.subjectimage-based graphical authentication
dc.subjectimpersonation attack
dc.subjectknowledge-based authentication mechanisms
dc.subjectlogin identifier
dc.subjectonline examination environments
dc.subjectonline learning environment
dc.subjectpasswords
dc.subjectphysical interaction
dc.subjectprofile based authentication framework
dc.subjectsecure authentication
dc.subjecttext based challenge questions
dc.subjecttraffic light system
dc.subjectusable authentication
dc.subjectAuthentication
dc.subjectEducational institutions
dc.subjectImage recognition
dc.subjectInternet
dc.subjectSyntactics
dc.subjectUsability
dc.subjectOnline learning
dc.subjectauthentication
dc.subjectchallenge questions
dc.subjectexamination
dc.subjectprofile
dc.subjectsecurity
dc.subjectusability
dc.titleGraphical and text based challenge questions for secure and usable authentication in online examinationsen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.contributor.institutionCentre for Computer Science and Informatics Research
rioxxterms.versionofrecordhttps://doi.org/10.1109/ICITST.2014.7038825
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record