Toward Secure User-Habit-Oriented Authentication for Mobile Devices

被引:0
|
作者
Seto, Jamie [1 ]
Wang, Ye [1 ]
Lin, Xiaodong [1 ]
机构
[1] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
关键词
Authentication; User-habit-oriented; Mobile; Security; Usability;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile device security has become increasingly important as we become more dependent on mobile devices. One fundamental security problem is user authentication, and if not executed correctly, leaves the mobile user vulnerable to harm like impersonation. Although many user authentication mechanisms have presented in the past, studies have shown mobile users prefer usability over security and, unfortunately, a higher level of security often entails sacrificing usability. Moreover, mobile users often unlock their devices in public spaces, inevitably resulting in a high possibility of user credentials disclosure. Motivated by the above, we introduce a novel user-habit-oriented authentication model, where mobile users can integrate their own habits with user authentication on mobile devices. The user-habit-oriented authentication turns a tedious security action into an enjoyable experience. Also, we propose a rhythm based authentication scheme, providing the first proof of concept toward secure user-habit-oriented authentication for mobile devices. Experimental results show that the proposed scheme has high accuracy in terms of false rejection rate. Also, the proposed scheme is able to protect from attacks caused by credential disclosure, which could be fatal to the traditional schemes.
引用
收藏
页码:1225 / 1231
页数:7
相关论文
共 50 条
  • [31] Secure and Efficient Mutual Authentication Scheme for NFC Mobile Devices
    You-Han Tung
    Wen-Shenq Juang
    Journal of Electronic Science and Technology, 2017, 15 (03) : 240 - 245
  • [32] A secure image-based authentication scheme for mobile devices
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 751 - 760
  • [33] Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint
    Quan Quach
    Ngu Nguyen
    Tien Dinh
    KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2013), VOL 1, 2014, 244 : 375 - 387
  • [34] Quantum secure two party authentication protocol for mobile devices
    Moony, Bshisht
    Barnwal, Amit K.
    Singh, Mrityunjay
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2548 - 2559
  • [35] Quantum secure two party authentication protocol for mobile devices
    Bshisht Moony
    Amit K. Barnwal
    Mrityunjay Singh
    Dheerendra Mishra
    Peer-to-Peer Networking and Applications, 2023, 16 : 2548 - 2559
  • [36] Toward secure mobile applications through proper authentication mechanisms
    Albesher, Abdulmohsen Saud
    Alkhaldi, Amal
    Aljughaiman, Ahmed
    PLOS ONE, 2024, 19 (12):
  • [37] Prototyping a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Panaousis, Emmanouil
    Rodriguez, Jonathan
    SENSORS, 2024, 24 (16)
  • [38] VOGUE: Secure User Voice Authentication on Wearable Devices using Gyroscope
    Chang, Shan
    Hu, Xinggan
    Zhu, Hongzi
    Liu, Wei
    Yang, Lei
    2022 19TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2022, : 361 - 369
  • [39] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [40] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330