Prototyping a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control

被引:0
|
作者
Papaioannou, Maria [1 ,2 ]
Zachos, Georgios [1 ,2 ]
Mantas, Georgios [1 ,2 ]
Panaousis, Emmanouil [2 ]
Rodriguez, Jonathan [1 ,3 ]
机构
[1] Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[2] Univ Greenwich, Fac Engn & Sci, Chatham ME4 4TB, England
[3] Univ South Wales, Fac Comp Engn & Sci, Pontypridd CF37 1DL, Wales
关键词
adaptive user authentication; risk-based user authentication; risk estimation; novelty detection; outlier detection; mobile passenger ID devices; prototype development; SYSTEM;
D O I
10.3390/s24165193
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As the number of European Union (EU) visitors grows, implementing novel border control solutions, such as mobile devices for passenger identification for land and sea border control, becomes paramount to ensure the convenience and safety of passengers and officers. However, these devices, handling sensitive personal data, become attractive targets for malicious actors seeking to misuse or steal such data. Therefore, to increase the level of security of such devices without interrupting border control activities, robust user authentication mechanisms are essential. Toward this direction, we propose a risk-based adaptive user authentication mechanism for mobile passenger identification devices for land and sea border control, aiming to enhance device security without hindering usability. In this work, we present a comprehensive assessment of novelty and outlier detection algorithms and discern OneClassSVM, Local Outlier Factor (LOF), and Bayesian_GaussianMixtureModel (B_GMM) novelty detection algorithms as the most effective ones for risk estimation in the proposed mechanism. Furthermore, in this work, we develop the proposed risk-based adaptive user authentication mechanism as an application on a Raspberry Pi 4 Model B device (i.e., playing the role of the mobile device for passenger identification), where we evaluate the detection performance of the three best performing novelty detection algorithms (i.e., OneClassSVM, LOF, and B_GMM), with B_GMM surpassing the others in performance when deployed on the Raspberry Pi 4 device. Finally, we evaluate the risk estimation overhead of the proposed mechanism when the best performing B_GMM novelty detection algorithm is used for risk estimation, indicating efficient operation with minimal additional latency.
引用
收藏
页数:18
相关论文
共 17 条
  • [1] Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
    Papaioannou, Maria
    Zachos, Georgios
    Essop, Ismael
    Mantas, Georgios
    Rodriguez, Jonathan
    IEEE ACCESS, 2022, 10 : 38832 - 38849
  • [2] Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices
    Papaioannou, Maria
    Mantas, Georgios
    Essop, Aliyah
    Sucasas, Victor
    Aaraj, Najwa
    Rodriguez, Jonathan
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 173 - 178
  • [3] Risk-Based User Authentication for Mobile Passenger ID Devices for Land and Sea Border Control
    Papaioannou, Maria
    Mantas, Georgios
    Rodriguez, Jonathan
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 180 - 185
  • [4] Risk-Based Adaptive User Authentication for Mobile Passenger ID Devices for Land/Sea Border Control
    Papaioannou, Maria
    Mantas, Georgios
    Essop, Aliyah
    Cox, Phil
    Otung, Ifiok E.
    Rodriguez, Jonathan
    2021 IEEE 26TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2021,
  • [5] Usable and secure? User perception of four authentication methods for mobile banking
    Kruzikova, Agata
    Knapova, Lenka
    Smahel, David
    Dedkova, Lenka
    Matyas, Vashek
    COMPUTERS & SECURITY, 2022, 115
  • [6] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [7] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [8] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [9] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [10] User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) : 107 - 118