Dynamic Multi-factor Authentication for Smartphone

被引:0
|
作者
Yohan, Alexander [1 ]
Lo, Nai-Wei [1 ]
Lie, Henry Roes [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
关键词
multi-factor authentication; implicit authentication; wearable device; BLE; NFC; Wi-Fi;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, smartphone has become a vital tool for both productivity and entertainment that most people can't live without it. Due to the widespread usage of smartphone for both personal and professional purposes, many people consider them as private property. This means other people should not be able to freely gain access to their smartphone, because it contains a lot of sensitive data. Therefore, its security is a very important research area with the potential to benefit millions of people in the world. A security system that protects owners from any breaches of privacy is needed to ensure the data inside the device stays private. In this paper, we propose a new system for securing smartphone. We incorporate a multi-factor authentication method to provide high security. Our system also incorporates an implicit authentication method to continuously authenticate the user and prevent unauthorized individuals from accessing the device. A prototype based on the proposed system is also constructed.
引用
收藏
页码:2448 / 2453
页数:6
相关论文
共 50 条
  • [41] Multi-Factor Biometrics for Authentication: A False Sense of Security
    Al-Assam, Hisham
    Sellahewa, Harin
    Jassim, Sabah
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 81 - 87
  • [42] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [43] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [44] Signing Documents by Hand: Model for Multi-Factor Authentication
    Bezzateev, Sergey
    Voloshina, Natalia
    Davydov, Vadim
    Minaeva, Tamara
    Rudavin, Nikolay
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2018, 2018, 11118 : 299 - 311
  • [45] Runtime adaptive multi-factor authentication for mobile devices
    Castro, P. C.
    Ligman, J. W.
    Pistoia, M.
    Ponzo, J.
    Thomas, G. S.
    Topkara, U.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [46] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [47] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [48] An Extensive Formal Analysis of Multi-factor Authentication Protocols
    Jacomme, Charlie
    Kremer, Steve
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [49] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [50] A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
    Otta, Soumya Prakash
    Panda, Subhrakanta
    Gupta, Maanak
    Hota, Chittaranjan
    FUTURE INTERNET, 2023, 15 (04):