IPAS: Implicit Password Authentication System Sadiq Almuairfi Dept. of Computer Science and Computer Engineering La Trobe University, 3086, Melbourne, Australia sadiqjafar@students.latrobe.edu.au Parakash Veeraraghavan and Naveen Chilamkurti Dept. of Computer Science and Computer Engineering La Trobe University, 3086, Melbourne, Australia {p.veera, n.chilamkurti}@latrobe.edu.au Abstract— Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit Password Authentication System, which is immune to the common attacks suffered by other authentication schemes. Keywords-Authentication; Graphical Password; Security; Mobile Banking. I. INTRODUCTION Authentication is a process of determining whether a particular individual or a device should be allowed to access a system or an application or merely an object running in a device. This is an important process which assures the basic security goals, viz. confidentiality and integrity. Also, adequate authentication is the first line of defense for protecting any resource. It is important that the same authentication technique may not be used in every scenario. For example, a less sophisticated approach may be used for accessing a “chat server” compared to accessing a corporate database. Most of the existing authentication schemes require processing both at the client and the server end. Thus, the acceptability of any authentication scheme greatly depends on its robustness against attacks as well as its resource requirement both at the client and at the server end. The resource requirement has become a major factor due to the proliferation of mobile and hand-held devices. Nowadays with the use of mobile phones, users can access any information including banking and corporate database. In this paper, we specifically target the mobile banking domain and propose a new and intelligent authentication scheme. However, our proposal can also be used in other domains where confidentiality and integrity are the major security requirements. The rest of the paper is organized as follows: Section 2 deals with various authentication schemes, and their advantages and disadvantages. In section 3, we mention the main problems of the existing schemes. In Section 4, we present our proposal and discuss its strengths and weaknesses compared with the existing schemes. Section 5 deals with conclusion and future directions. II. VARIOUS AUTHENTICATION SCHEMES There are several authentication schemes available in the literature. They can be broadly classified as follows: What you know What you have and What you are The traditional username/password or PIN based authentication scheme is an example of the “what you know type”. Smartcards or electronic tokens are examples of “what you have type of authentication” and finally biometric based authentication schemes are examples of the “what you are” type of authentication. Some authentication systems may use a combination of the above schemes. In this paper, we focus only on “what you know” types of authentication. Although traditional alphanumeric passwords are used widely, they have problems such as being hard to remember, vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering [1]. In addition to these types of attacks, a user may tend to choose a weak password or record his password. This may further weaken the authentication schemes. As an alternative to the traditional password based scheme, the biometric system was introduced. This relies upon unique features unchanged during the life time of a human, such as finger prints, iris etc. The major problem of biometric as an authentication scheme is the high cost of additional devices needed for identification process [2]. The false-positive and false- negative rate may also be high if the devices are not robust. Biometric systems are vulnerable to replay attack (by the use of sticky residue left by finger on the devices), which reduces the security and usability levels. Thus, recent developments have attempted to overcome biometric shortcomings by introducing token-based authentication schemes. Token based systems rely on the use of a physical device such as smartcards or electronic-key for authentication purpose. This may also be used in conjunction with the 2011 Workshops of International Conference on Advanced Information Networking and Applications 978-0-7695-4338-3/11 $26.00 © 2011 IEEE DOI 10.1109/WAINA.2011.36 430