A systematic review of PIN-entry methods resistant to shoulder-surfing attacks

F Binbeshr, MLM Kiah, LY Por, AA Zaidan - computers & security, 2021‏ - Elsevier
Although conventional PIN-entry methods are widely used in many daily authentication
procedures, they are highly susceptible to shoulder-surfing attacks. A plethora of PIN-entry …

Aot: Authentication and access control for the entire iot device life-cycle

ALM Neto, ALF Souza, I Cunha, M Nogueira… - Proceedings of the 14th …, 2016‏ - dl.acm.org
The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices,
ranging from mundane artifacts to complex biosensors connected across disparate …

Secure pin-entry method using one-time pin (OTP)

F Binbeshr, LY Por, MLM Kiah, AA Zaidan… - IEEE Access, 2023‏ - ieeexplore.ieee.org
The regular PIN-entry method has been still the most common method of authentication for
systems and networks. However, PINs are easy to be captured through various attacks …

FLAT: Federated lightweight authentication for the Internet of Things

MLBA Santos, JC Carneiro, AMR Franco, FA Teixeira… - Ad Hoc Networks, 2020‏ - Elsevier
Abstract Federated Identity Management schemes (FIdMs) are of great help for traditional
systems as they improve user authentication and privacy. In this paper, we claim that …

Internet of things device authentication via electromagnetic fingerprints

A Souza, I Carlson, HS Ramos… - Engineering …, 2020‏ - Wiley Online Library
We quickly approach a future where Internet of Things (IoT) devices are the norm. In this
scenario, humans are surrounded by a multitude of heterogeneous devices that assist them …

Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks

F Binbeshr, L Yee, ML Kiah - Challenge-Response Pin …, 2023‏ - papers.ssrn.com
Although the regular PIN authentication system is widely used in daily authentication, it is
often easy to be captured through simple and effective attacks such as shoulder surfing and …

Seamless Security on Mobile Devices Textual Password Quantification Model Based Usability Evaluation of Secure Rotary Entry Pad Authentication

H Kabetta, H Setiawan… - MATRIK: Jurnal …, 2023‏ - journal.universitasbumigora.ac.id
Mobile devices are vulnerable to shoulder surfing and smudge attacks, which should occur
when a user enters a PIN for authentication purposes. This attack can be avoided by …

[PDF][PDF] PIN (OTP)

F BINBESHR, M KIAH, AA ZAIDAN, M IMAM‏ - academia.edu
The regular PIN-entry method has been still the most common method of authentication for
systems and networks. However, PINs are easy to be captured through various attacks …

Challenges and Directions for Authentication in Pervasive Computing

A Souza, AAF Loureiro, LB Oliveira - arxiv preprint arxiv:1907.05214, 2019‏ - arxiv.org
We quickly approach a" pervasive future" where pervasive computing is the norm. In this
scenario, humans are surrounded by a multitude of heterogeneous devices that assist them …