Alphanumeric text and PINs continue to be the dominant authentication methods in spite of the numerous concerns by security researchers of their inability to properly address usability and security flaws and to effectively combine usability and security. These flaws have, however, contributed to the growing research interest in the development and use of graphical authentication systems as alternatives to text based systems. Graphical passwords or graphical authentication systems are password systems that use images rather than characters or numbers in user authentication. In spite of the growing acceptance of graphical passwords, empirical studies have shown that graphical authentication systems have also inherited some of the flaws of text-based passwords. These flaws include predictability, vulnerability to observational attacks and the inability of systems to efficiently combine security with usability. Hence, there is a continued quest to find a "system" that has both strong usability and strong security. This paper is a detailed review of the current state of research into graphical authentication systems. The paper considers in detail some of the mechanisms used in graphical authentication, along with the flaws and strengths of each. The paper also concludes with some suggested ways forward.
No abstract
SIMBox or Interconnect Bypass Fraud is one of the most rapidly emerging frauds in today's telecommunications industry, costing the industry between $3 and $7 billion USD in annual revenue losses. This was spread as a result of calls made over the internet and routed to SIMboxes (machines that contain SIM cards) that redirect illegitimate VoIP traffic onto mobile networks. Fraudsters effectively avoid the inter-connect toll charging points by exploiting the difference between the high interconnect rates and the low retail price for on-network calls, thereby avoiding payment of an Operator's or MVNO's official call termination fee. This paper is a fact-finding type that investigates the impact of SIMBox fraud on the telecom industry and the economic development of nations. By disclosing the fraud detection approaches used for its abolition and identifying their flaws. For this study, a quantitative method was used. The study's literary material spans the years 1994 to 2021. Journals, white papers, M.Sc., and Ph.D. theses on the subject are examples.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.