WACA: Wearable-Assisted Continuous Authentication

被引:34
作者
Acar, Abbas [1 ]
Aksu, Hidayet [1 ]
Uluagac, A. Selcuk [1 ]
Akkaya, Kemal [2 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Cyber Phys Syst Secur Lab CSL, Miami, FL 33199 USA
[2] Florida Int Univ, Dept Elect & Comp Engn, Adv Wireless & Secur Lab, Miami, FL 33199 USA
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018) | 2018年
基金
美国国家科学基金会;
关键词
continuous authentication; wearables; biometrics; keystroke dynamics; typing;
D O I
10.1109/SPW.2018.00042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session, which is lacking in existing one-time login systems. In this paper, we introduce a usable and reliable Wearable-Assisted Continuous Authentication (WACA), which relies on the sensor-based keystroke dynamics and the authentication data is acquired through the built-in sensors of a wearable (e.g., smartwatch) while the user is typing. The acquired data is periodically and transparently compared with the registered profile of the initially logged-in user with one-way classifiers. With this, WACA continuously ensures that the current user is the user who logged-in initially. We implemented the WACA framework and evaluated its performance on real devices with real users. The empirical evaluation of WACA reveals that WACA is feasible and its error rate is as low as 1% with 30 seconds of processing time and 2 - 3% for 20 seconds. The computational overhead is minimal. Furthermore, WACA is capable of identifying insider threats with very high accuracy (99.2%).
引用
收藏
页码:264 / 269
页数:6
相关论文
共 21 条
[1]  
Acar A., 2017, SURVEY HOMOMORPHIC E
[2]  
[Anonymous], 2017, Advances in user authentication
[3]  
[Anonymous], 2001, ELEMENTS STAT LEARNI
[4]  
[Anonymous], 2016, P SOUTHEAST EUR DES
[5]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[6]  
Carrillo C.M., 2003, Continuous biometric authentication for authorized aircraft personnel: A proposed design
[7]  
Eberz S., 2015, NDSS
[8]   Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics [J].
Eberz, Simon ;
Rasmussen, Kasper B. ;
Lenders, Vincent ;
Martinovic, Ivan .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :386-399
[9]  
Google, 2016, GOOGL EYES BEH SOL C
[10]  
Huhta O., 2015, ARXIV PREPRINT ARXIV