Dynamic Multi-factor Authentication for Smartphone

被引:0
|
作者
Yohan, Alexander [1 ]
Lo, Nai-Wei [1 ]
Lie, Henry Roes [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
multi-factor authentication; implicit authentication; wearable device; BLE; NFC; Wi-Fi;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, smartphone has become a vital tool for both productivity and entertainment that most people can't live without it. Due to the widespread usage of smartphone for both personal and professional purposes, many people consider them as private property. This means other people should not be able to freely gain access to their smartphone, because it contains a lot of sensitive data. Therefore, its security is a very important research area with the potential to benefit millions of people in the world. A security system that protects owners from any breaches of privacy is needed to ensure the data inside the device stays private. In this paper, we propose a new system for securing smartphone. We incorporate a multi-factor authentication method to provide high security. Our system also incorporates an implicit authentication method to continuously authenticate the user and prevent unauthorized individuals from accessing the device. A prototype based on the proposed system is also constructed.
引用
收藏
页码:2448 / 2453
页数:6
相关论文
共 50 条
  • [1] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [2] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [3] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [4] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [5] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [6] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [7] Bypassing Multi-Factor Authentication
    Russell S.
    ITNOW, 2023, 65 (01) : 42 - 45
  • [8] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [9] Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery
    Zhu, Liufu
    Wang, Ding
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8398 - 8413
  • [10] Multi-factor authentication at jagged peak
    Gill G.
    Jones J.
    2016, Informing Science Institute (05) : 1 - 16