Toward Secure User-Habit-Oriented Authentication for Mobile Devices

被引:0
作者
Seto, Jamie [1 ]
Wang, Ye [1 ]
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
来源
2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014) | 2014年
关键词
Authentication; User-habit-oriented; Mobile; Security; Usability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile device security has become increasingly important as we become more dependent on mobile devices. One fundamental security problem is user authentication, and if not executed correctly, leaves the mobile user vulnerable to harm like impersonation. Although many user authentication mechanisms have presented in the past, studies have shown mobile users prefer usability over security and, unfortunately, a higher level of security often entails sacrificing usability. Moreover, mobile users often unlock their devices in public spaces, inevitably resulting in a high possibility of user credentials disclosure. Motivated by the above, we introduce a novel user-habit-oriented authentication model, where mobile users can integrate their own habits with user authentication on mobile devices. The user-habit-oriented authentication turns a tedious security action into an enjoyable experience. Also, we propose a rhythm based authentication scheme, providing the first proof of concept toward secure user-habit-oriented authentication for mobile devices. Experimental results show that the proposed scheme has high accuracy in terms of false rejection rate. Also, the proposed scheme is able to protect from attacks caused by credential disclosure, which could be fatal to the traditional schemes.
引用
收藏
页码:1225 / 1231
页数:7
相关论文
共 5 条
[1]   FUZZY ARTMAP - A NEURAL NETWORK ARCHITECTURE FOR INCREMENTAL SUPERVISED LEARNING OF ANALOG MULTIDIMENSIONAL MAPS [J].
CARPENTER, GA ;
GROSSBERG, S ;
MARKUZON, N ;
REYNOLDS, JH ;
ROSEN, DB .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1992, 3 (05) :698-713
[2]   Authenticating mobile phone users using keystroke analysis [J].
Clarke, N. L. ;
Furnell, S. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) :1-14
[3]  
Dora R., 2013, P SPIE, V8757
[4]  
Sethi A., USER AUTHENTICATION
[5]  
Zhu H., SECURITY CO IN PRESS