Comparison between Usability and Security in Android Pattern System


Authors : Musa Ibrahim Kamba; Anas Shehu; Zauwali Sabitu Paki

Volume/Issue : Volume 10 - 2025, Issue 3 - March


Google Scholar : https://tinyurl.com/bp6yvbak

Scribd : https://tinyurl.com/mtj8a969

DOI : https://doi.org/10.38124/ijisrt/25mar041

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The research evaluates the usability and security of different Android patterns across 3x3, 3x4, and 4x4 grids on smartphone authentication mechanisms. Through an experiment with 90 volunteers using a specially created Android application, this study examines the security and usability of the Android pattern lock system. The results show that roughly 70% of participants authenticated on their first try, while only 13% failed to authenticate on their first, second, and third try, indicating that they failed to remember their pattern supply during the experiment, although the Android pattern lock is generally user-friendly, there are significant security concerns, as indicated by the failure rate. The findings advocate for the adoption of larger grid sizes to mitigate brute force and guess-based attacks while maintaining acceptable usability levels.

Keywords : Usability, Security, Pattern Lock, Smudge Attack, Observation Attack.

References :

  1. H. Khan, U. Hengartner, and D. Vogel, “Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying,” in Symposium on Usable Privacy and Security (SOUPS), Ottawa Canada, 2015.
  2. W. H. Lee, X. Liu, Y. Shen, H. Jin, and R. B. Lee, “Secure Pick Up: Implicit Authentication When You Start Using the Smartphone,” in SACMAT’17, Indianapolis, IN, USA, 2017.
  3. F. Schaub, R. Deyhle, and MichaelWeber, “Password Entry Usability and Shoulder Surfing Susceptibility on Different Smartphone Platforms,” in MUM ’12, Ulm, Germany, 2012.
  4. E. Hjelmas, and B. K. Low, “Face Detection: A Survey,” Computer Vision and Image Understanding, no. 83, pp. 236–274, 2001.
  5. K. Bonsor, and R. Johnson. "How Facial Recognition Systems Work," 15/06/2022, 2022; https://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition.htm.
  6. S. Liu, and M. Silverman, “A Practical Guide to Biometric Security Technology,” IT Pro, pp. 27-32, February 2001, 2001.
  7. X. Jiang, "Fingerprint Classification," Encyclopedia of Biometrics, A. Maraikayar, ed., Springer-Verlag Berlin Heidelberg, 2009, pp. 439-446.
  8. S. C. Dass, and A. K. Jain, “Fingerprint-Based Recognition,” Technometrics, vol. 49, no. 3, pp. 262-276, 2007.
  9. DigitalPersona, "Best Practices for Implementing Fingerprint Biometrics in Applications," Digitalpersona Camera Manual, 2009].
  10. Neurotechnology. "Neurotechnology Company Brochure," 15/05/2022, 2022; https://download.neurotechnology.com/Neurotechnology_Brochure_2022-02-17.pdf.
  11. V. A. Sujan, and M. P. Mulqueen, “Fingerprint identification using space invariant transforms,” Pattern Recognition Letters pp. 609 – 619, 2002.
  12. C. H. Park, and H. Park, “Fingerprint classification using fastFourier transform and nonlinear discriminant analysis,” Pattern Recognition, no. 38, pp. 495–503, 2005.
  13. M. Harbach, A. D. Luca, and S. Egelman, “The Anatomy of Smartphone Unlocking A Field Study of Android Lock Screens,” in CHI 2016, San Jose, CA, USA, 2016, pp. 12.
  14. A. Bello, S. Anas, S. Shamsu, and S. P. Zauwali, “Evaluation of the Effectiveness of PIN Code Authentication on Android Smart Devices,” International Journal of Innovative Science and Research Technology, vol. 8, no. 10, pp. 483-486, 2023.
  15. M. D. Nasiru, S. Anas, S. P. Zauwali, and S. Shamsu, “Assessment of the Usability and Acceptability of Passface Authentication Mechanism on Android Phones,” International Journal of Innovative Science and Research Technology, vol. 7, no. 11, pp. 2456-2165, 2022.
  16. H. Khan, U. Hengartner, and D. Vogel, "Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying."
  17. C. Yongkiatpanich, and D. Wichadakul, “Extractive Text Summarization Using Ontology and Graph-Based Method,” in 2019 IEEE 4th International Conference on Computer and Communication Systems, 2019, pp. 105-110.
  18. P. Andriotis, T. Tryfonas, and G. Oikonomou, “Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method,” Information Security Journal: A Global Perspective, vol. 23, no. 3, pp. 127-137, 2014.
  19. T. J. Forman, and A. J. Aviv, “Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns.,” arXiv preprint arXiv:2008.10681, pp. 1-7, 2020.
  20. A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, “Smudge Attacks on Smartphone Touch Screens. Proceedings of the 4th USENIX Conference on Offensive Technologies,” in Proceedings of the 4th USENIX Conference on Offensive Technologies, 2010, pp. 1-7.
  21. J. Zheng, and X. Zhang, “M-Pattern: A Novel Scheme for Improving the Security of Android Unlock Patterns.,” Journal of Information Security and Applications, vol. 46, pp. 1-9, 2019.
  22. K. Boudaoud, M. Winckler, Z. S. Paki, and P. Phalanque, “A Testbed Tool for Comparing Usability and Security of Mobile Authentication Mechanisms,” in 7th International Workshop on ADVANCEs in ICT Infrastructures and Services., Praia, Cape Verde Faculdade de Ciências e Tecnologias" of the University of Cape Verde (UNICV), 2019.

The research evaluates the usability and security of different Android patterns across 3x3, 3x4, and 4x4 grids on smartphone authentication mechanisms. Through an experiment with 90 volunteers using a specially created Android application, this study examines the security and usability of the Android pattern lock system. The results show that roughly 70% of participants authenticated on their first try, while only 13% failed to authenticate on their first, second, and third try, indicating that they failed to remember their pattern supply during the experiment, although the Android pattern lock is generally user-friendly, there are significant security concerns, as indicated by the failure rate. The findings advocate for the adoption of larger grid sizes to mitigate brute force and guess-based attacks while maintaining acceptable usability levels.

Keywords : Usability, Security, Pattern Lock, Smudge Attack, Observation Attack.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe