A Lightweight and Stable Authentication Method for the Internet Access Control in Smartphones

被引:0
作者
Yoo, SeongMin [1 ]
Yoo, JinSeung [2 ]
Park, PyungKoo [3 ]
Ryou, JaeCheol [1 ]
机构
[1] Chungnam Natl Univ, Dept Comp Engn, Taejon, South Korea
[2] KISTI, Div Knowledge Informat, Daejeon, South Korea
[3] Dept ETRI, Future Network Res, Daejeon, South Korea
来源
INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I | 2011年 / 251卷
基金
新加坡国家研究基金会;
关键词
Authentication; Smartphone Authentication; Access Control; IDENTITY AUTHENTICATION; GUESSING RATES; SECURITY; PASSWORDS; BIOMETRICS; USABILITY; TOKENS; RECALL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet users' platform move toward smart mobile devices like smartphones and tablet PCs, so the user authentication and access control for the mobile users are strongly required to support information securities. Mobile devices have weak points like low computing power, limited power, and restricted interfaces compared with the PC. So, these characteristics of mobile devices require light-weight and stable user authentication methods. This paper proposes user authentication LSAM (Lightweight & Stable Authentication Method) applicable to smart mobile devices (representatively Smartphone). LSAM gives a way to identify the users through random matrix displayed on smart mobile devices. Authentication Token used in LSAM is featured with variations on values of the matrix, so it is safe to replay attack and sniffing attack. LSAM does not need additional devices; it is just operated as the interface software on the mobile smartphone. We will show the evaluation criteria of the mainly used hacking techniques like the Challenger Variability, Replay Attack, Brute-force Attack, MITM (Man In-The-Middle Attack) and measured the degree of defenses of our proposed authentication algorithm to these attacks.
引用
收藏
页码:331 / +
页数:3
相关论文
共 23 条
[1]  
Abdullayeva F., 2008, PCI 2008 P SEPT
[2]  
Adams A., 1997, People and Computers XII. Proceedings of HCI '97, P1
[3]  
Ansari S, 2002, IEEE POTENTIALS, V21, P17, DOI 10.1109/MP.2002.1166620
[4]   IMPROVING SYSTEM SECURITY VIA PROACTIVE PASSWORD CHECKING [J].
BISHOP, M ;
KLEIN, DV .
COMPUTERS & SECURITY, 1995, 14 (03) :233-249
[5]  
Bromme Arslan, 2006, Int. J. Netw. Secur., V2, P52
[6]   Generating and remembering passwords [J].
Brown, AS ;
Bracken, E ;
Zoccoli, S ;
Douglas, K .
APPLIED COGNITIVE PSYCHOLOGY, 2004, 18 (06) :641-651
[7]   Cognitive, associative and conventional passwords: Recall and guessing rates [J].
Bunnell, J ;
Podd, J ;
Henderson, R ;
Napier, R ;
Kennedy-Moffat, J .
COMPUTERS & SECURITY, 1997, 16 (07) :629-641
[8]  
FELDMEIER DC, 1990, LECT NOTES COMPUT SC, V435, P44
[9]  
FFIE Council, AUTH INT BANK ENV
[10]   Authentication and supervision: A survey of user attitudes [J].
Furnell, SM ;
Dowland, PS ;
Illingworth, HM ;
Reynolds, PL .
COMPUTERS & SECURITY, 2000, 19 (06) :529-539