User-Silicon Entangled Mobile Identity Authentication

被引:0
|
作者
Timothy Dee
Ryan Scheel
Nicholas Montelibano
Akhilesh Tyagi
机构
[1] Iowa State University,
关键词
Physical unclonable function (PUF); Mobile device; Authentication; Security;
D O I
10.1007/s41635-020-00098-7
中图分类号
学科分类号
摘要
We explore mobile device touchscreen characteristics to build a user-device (UD) biometric physical unclonable function (PUF). Human user touchscreen interaction induces dynamic capacitive differences. Sensors detect current differences which are a function of both (1) a human biometric of how a shape is traced and (2) silicon foundry process transistor-level variability embedded in the touchscreen grid. This forms a physical function with input x defining a shape and output y abstracted from the measured current value stream. We argue and establish that this physical function has PUF attributes. Moreover, it provides a robust user-device biometric-based authentication mechanism. Authentication is based on geometric shapes (challenges) drawn on the touchscreen. Users trace them. The authentication layer creates a response abstract, and validates it against a user profile. Authentication accuracy is affected by the complexity of geometric shapes as well as the validation algorithm. We consider polyline shapes (simple gestures) and complex closed geometric shapes (complex gestures). Complex gestures offer higher response entropy, but are computationally less efficient with a slightly lower validation accuracy. Complex gestures achieve 99.6% accuracy compared with 100% for simple gestures. User profiles exhibit physical unclonable function (PUF) properties. Touchscreen gestures are quantized into binary strings. Gesture hamming distance is 60+ bits for 128-bit strings for different user-device profiles; it is 0 bits for the same profile. This demonstrates variability and reproducibility respectively. Montreal TestU01 tests binary string pseudorandom characteristics; the majority of tests pass showing pseudorandom number generator (PRG) characteristics.
引用
收藏
页码:208 / 229
页数:21
相关论文
共 50 条
  • [1] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [2] Trends in User Identity and Continuous Authentication
    Lopes dos Santos, Uelison Jean
    da Costa, Cristiano Andre
    Mayer, Andre Henrique
    dos Reis, Eduardo Souza
    Cruz Maldonado, Juan Eduardo
    Victoria Barbosa, Jorge Luis
    Antunes, Rodolfo Stoffel
    Righi, Rodrigo da Rosa
    Flores, Nelson Eduardo
    COMPUTER, 2022, 55 (11) : 52 - 61
  • [3] User identity: the key to safe authentication
    Stuhlmuller, R
    COMMUNICATIONS NEWS, 2000, 37 (03): : 32 - +
  • [4] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [5] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [6] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [7] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [8] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [9] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [10] User Authentication Using Mobile Phones for Mobile Payment
    Sung, Soonhwa
    Youn, Cheong
    Kong, Eunbae
    Ryou, Jaecheol
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 51 - 56