A framework for continuous, transparent mobile device authentication

被引:67
作者
Crawford, Heather [1 ]
Renaud, Karen [1 ]
Storer, Tim [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
关键词
Authentication; Biometrics; Transparent; Framework; Mobile;
D O I
10.1016/j.cose.2013.05.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address two distinct problems with de facto mobile device authentication, as provided by a password or sketch. Firstly, device activity is permitted on an all-or-nothing basis, depending on whether the user successfully authenticates at the beginning of a session. This ignores the fact that tasks performed on a mobile device have a range of sensitivities, depending on the nature of the data and services accessed. Secondly, users are forced to re-authenticate frequently due to the bursty nature that characterizes mobile device use. Owners react to this by disabling the mechanism, or by choosing a weak "secret". To address both issues, we propose an extensible Transparent Authentication Framework that integrates multiple behavioral biometrics with conventional authentication to implement an effortless and continuous authentication mechanism. Our security and usability evaluation of the proposed framework showed that a legitimate device owner can perform all device tasks, while being asked to authenticate explicitly 67% less often than without a transparent authentication method. Furthermore, our evaluation showed that attackers are soon denied access to on-device tasks as their behavioral biometrics are collected. Our results support the creation of a working prototype of our framework, and provide support for further research into transparent authentication on mobile devices. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 28 条
  • [1] [Anonymous], 2009, Consumer Communications and Networking Conference, DOI DOI 10.1109/CCNC.2009.4784783
  • [2] [Anonymous], 2008, AUSTR INF SEC MAN C, DOI DOI 10.4225/75/57B55A56B876A
  • [3] [Anonymous], 2009, Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
  • [4] Aviv AJ, 2010, P WOOT
  • [5] BONASTRE JF, 2003, P EUR
  • [6] Bonneau J, 2012, P FIN CRYPT
  • [7] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [8] Bonneau Joseph, 2010, WORKSH EC INF SEC WE
  • [9] Briggs Pamela., 2008, CHI'08 Extended Abstracts on Human Factors in Computing Systems, P2423
  • [10] Canalys, SMART PHON OV CLIENT