Fig. 1 Hacker doing shoulder surfing attack
Fig. 2 Left) Traditional keypad Right) keypad to suggest
Fig. 3 The location of the keypad and the locations of the numbers are switched when keypad input occurs
Fig. 4 Left) When a password set by the user is entered, the phrase OK is displayed Right) If the password entered is incorrect, the phrase Wrong password is displayed
Fig. 5 Implementation of lock object
Fig. 6 If the password set by the user is correct, the lock will open
Fig. 7 Smart gloves implemented using multiple sensors
Fig. 8 Left) Initial Run Screen Right) When user authentication is completed
Table. 1 Smart gloves implemented using multiple sensors
Table. 2 Result of shoulder surfing attack on existing virtual keypads
Table. 3 Result of shoulder surfing attack on proposal virtual keypads
Table. 4 Average input time per keypad
Table. 5 Results of security survey of proposed methods
Table. 6 Results of convenience survey of proposed methods
References
- E. J. Song, "A Study on Training System for Fire Prevention based on Virtual Reality," Digital Contents Society, vol. 17, no. 3, pp. 189-195, Jun. 2016. https://doi.org/10.9728/dcs.2016.17.3.189
- Y. K. Chung, "Development of VR Fire-extinguishing Experience Education Contents Using UX Design Methodology," The Korea contents society, vol. 17, no. 3, pp. 222-230, Mar. 2017. https://doi.org/10.5392/JKCA.2017.17.01.222
- K. J. Seo, J. H. Yun, K. S. Nam, and S. G. Kim, "Development of the Educational V-Factory system combining Virtual Reality," The Korea Academia-Industrial cooperation Society, vol. 19, no. 4, pp. 617-622, Apr. 2018.
- Y. M. Lee, J. A. Park, S. H. Lee, S. J. Kim, and J. K. Lee, "Development of Anxiety Measuring App and VR System for Panic Disorder Exposure Training," KIISE Transactions on Computing Practices, vol. 24, no. 5, pp. 227-233, May. 2018. https://doi.org/10.5626/KTCP.2018.24.5.227
- N. Y. Yang, H. S. Park, T. H. Yoon, and J. H. Moon, "Effectiveness of Motion-Based Virtual Reality Training (Joystim) on Cognitive Function and Activities of Daily Living in Patients with Stroke," Rehabilitation Engineering And Assistive Technology Society of Korea, vol. 12, no. 1, pp. 10-19, Feb. 2018.
- T. U. Kang, and H. K. Kim, "VR Threat Analysis for Information Assurance of VR Device and Game System," Korea Institute of Information Security & Cryptology, vol. 28, no. 2, pp. 437-447, Apr. 2018.
- Y. H. Kong, and W. C. Lee, "Motion Control System for a Robotic Manipulator Using Leap Motion," Korean Institute of Information Technology, vol. 14, no. 12, pp. 1-6, Dec. 2016.
- B. H. Kang, J. S. Kim, and H. W. Kim, "Study for Operation Teaching Machine Using 3D Virtual Reality System," Digital Contents Society, vol. 17, no. 4, pp. 287-293, Aug. 2016. https://doi.org/10.9728/dcs.2016.17.4.287
- M. J. Kim, J. M. Heo, J. H. Kim, S. Y. Park, and J. H. Chang, "Development and Evaluation of Leapmotion-based Game interface considering Intuitive Hand Gestures," The Korean Society for Computer Game, vol. 27, no. 4, pp.69-75, Dec. 2014.
- S. H. Kim, M. S. Park, and S. J. Kim, "Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes," The Korea Institute of Information Security & Cryptology, vol. 24, no. 6, pp. 1159-1174, Dec. 2014. https://doi.org/10.13089/JKIISC.2014.24.6.1159
- H. J. Seo, and H. W. Kim, "Design of Security Keypad Against Key Stroke Inference Attack," The Korean Institute of Information Security & Cryptology, vol. 26, no. 1, pp. 41-47, Feb. 2016. https://doi.org/10.13089/JKIISC.2016.26.1.41