Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns

被引:7
|
作者
Findling, Rainhard Dieter [1 ]
Mayrhofer, Rene [2 ]
机构
[1] Univ Appl Sci Upper Austria, JRZ Usmile, Softwarepk 11, A-4232 Hagenberg, Austria
[2] Johannes Kepler Univ Linz, JRZ Usmile, A-4040 Linz, Austria
关键词
Phishing hardware; mobile authentication; vibration; feedback;
D O I
10.1145/2836041.2836053
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users usually authenticate to mobile devices before using them (e.g. PIN, password), but devices do not do the same to users. Revealing the authentication secret to a non-authenticated device potentially enables attackers to obtain the secret, by replacing the device with an identical-looking malicious device. The revealed authentication secret could be transmitted to the attackers immediately, who then conveniently authenticate to the real device. Addressing this attack scenario, we analyze different approaches towards mobile device-to-user (D2U) authentication, for which we provide an overview of advantages/drawbacks, potential risks and device authentication data bandwidth estimations. We further analyze vibration as one D2U feedback channel that is unobtrusive and hard to eavesdrop, including a user study to estimate vibration pattern recognition using a setup of similar to 7 bits per second (b/s). Study findings indicate that users are able to distinguish vibration patterns with median correctness of 97.5% (without taking training effects into account) - which indicates that vibration could act as authentication feedback channel and should be investigated further in future research.
引用
收藏
页码:131 / 135
页数:5
相关论文
共 7 条
  • [1] Towards Coupling User and Device Locations Using Biometrical Authentication on Smartphones
    Trojahn, Matthias
    Marcus, Philipp
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 736 - 741
  • [2] Approach for Protecting Mobile Device User's Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 886 - 893
  • [3] Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    N. N. Shenets
    Automatic Control and Computer Sciences, 2023, 57 : 886 - 893
  • [4] User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition
    Charlier, Jeremy
    Falk, Eric
    State, Radu
    Hilger, Jean
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 886 - 894
  • [5] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Li, Xiong
    Liao, Junguo
    Kumari, Saru
    Liang, Wei
    Wu, Fan
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (01) : 263 - 288
  • [6] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Xiong Li
    Junguo Liao
    Saru Kumari
    Wei Liang
    Fan Wu
    Muhammad Khurram Khan
    Wireless Personal Communications, 2015, 85 : 263 - 288
  • [7] User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
    Saevanee, Hataichanok
    Hatarakosol, Pattarasince
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 82 - 86