User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices

被引:17
|
作者
Seto, Jamie [1 ]
Wang, Ye [1 ]
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Fac Business & Informat Technol, Inst Technol, Oshawa, ON L1H 7K4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication; habit-oriented; mobile; theory of mind; security; usability;
D O I
10.1109/TETC.2014.2379991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile device security has become increasingly important as we become more dependent on mobile devices. One fundamental security problem is user authentication, and if not executed correctly, leaves the mobile user vulnerable to harm like impersonation and unauthorized access. Although many user authentication mechanisms have been presented in the past, studies have shown mobile users preferring usability over security. Furthermore, mobile users often unlock their devices in public spaces, inevitably resulting in a high possibility of user credentials disclosure. Motivated by the above, we introduce a novel user-habit-oriented authentication model, where mobile users can integrate their own habits (or hobbies) with user authentication on mobile devices. The user-habit-oriented authentication turns a tedious security action into an enjoyable experience. In addition, we propose a rhythm-based authentication scheme, providing the first proof of concept toward secure user-habit-oriented authentication for mobile devices. The proposed scheme also takes the first step toward using the theory of mind into security field. Experimental results show that the proposed scheme has high accuracy in terms of false rejection rate. In addition, the proposed scheme is able to protect from attacks caused by credential disclosure, which could be fatal if it was done through the traditional schemes.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [1] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [2] User-Friendly and Secure Architecture (UFSA) for Authentication of Cloud Services
    Fathi, Reza
    Salehi, Mohsen Amini
    Leiss, Ernst L.
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 516 - 523
  • [3] Towards A User-friendly and Secure Hand Shaking Authentication for Smartphones
    Yan, Jinpei
    Qi, Yong
    Rao, Qifan
    Qi, Saiyu
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1170 - 1179
  • [4] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [5] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [6] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [7] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [8] A user-friendly approach to human authentication of messages
    King, J
    dos Santos, A
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 225 - 239
  • [9] A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechanism
    Chang, Ya-Fen
    Chang, Chin-Chen
    Su, Yu-Wei
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 741 - +
  • [10] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548