Toward Secure User-Habit-Oriented Authentication for Mobile Devices

被引:0
|
作者
Seto, Jamie [1 ]
Wang, Ye [1 ]
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
关键词
Authentication; User-habit-oriented; Mobile; Security; Usability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile device security has become increasingly important as we become more dependent on mobile devices. One fundamental security problem is user authentication, and if not executed correctly, leaves the mobile user vulnerable to harm like impersonation. Although many user authentication mechanisms have presented in the past, studies have shown mobile users prefer usability over security and, unfortunately, a higher level of security often entails sacrificing usability. Moreover, mobile users often unlock their devices in public spaces, inevitably resulting in a high possibility of user credentials disclosure. Motivated by the above, we introduce a novel user-habit-oriented authentication model, where mobile users can integrate their own habits with user authentication on mobile devices. The user-habit-oriented authentication turns a tedious security action into an enjoyable experience. Also, we propose a rhythm based authentication scheme, providing the first proof of concept toward secure user-habit-oriented authentication for mobile devices. Experimental results show that the proposed scheme has high accuracy in terms of false rejection rate. Also, the proposed scheme is able to protect from attacks caused by credential disclosure, which could be fatal to the traditional schemes.
引用
收藏
页码:1225 / 1231
页数:7
相关论文
共 50 条
  • [1] User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) : 107 - 118
  • [2] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [3] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [4] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [5] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [6] Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
    Papaioannou, Maria
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Rodriguez, Jonathan
    [J]. IEEE ACCESS, 2022, 10 : 38832 - 38849
  • [7] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [8] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [9] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [10] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268