User-Silicon Entangled Mobile Identity Authentication

被引:0
|
作者
Timothy Dee
Ryan Scheel
Nicholas Montelibano
Akhilesh Tyagi
机构
[1] Iowa State University,
关键词
Physical unclonable function (PUF); Mobile device; Authentication; Security;
D O I
10.1007/s41635-020-00098-7
中图分类号
学科分类号
摘要
We explore mobile device touchscreen characteristics to build a user-device (UD) biometric physical unclonable function (PUF). Human user touchscreen interaction induces dynamic capacitive differences. Sensors detect current differences which are a function of both (1) a human biometric of how a shape is traced and (2) silicon foundry process transistor-level variability embedded in the touchscreen grid. This forms a physical function with input x defining a shape and output y abstracted from the measured current value stream. We argue and establish that this physical function has PUF attributes. Moreover, it provides a robust user-device biometric-based authentication mechanism. Authentication is based on geometric shapes (challenges) drawn on the touchscreen. Users trace them. The authentication layer creates a response abstract, and validates it against a user profile. Authentication accuracy is affected by the complexity of geometric shapes as well as the validation algorithm. We consider polyline shapes (simple gestures) and complex closed geometric shapes (complex gestures). Complex gestures offer higher response entropy, but are computationally less efficient with a slightly lower validation accuracy. Complex gestures achieve 99.6% accuracy compared with 100% for simple gestures. User profiles exhibit physical unclonable function (PUF) properties. Touchscreen gestures are quantized into binary strings. Gesture hamming distance is 60+ bits for 128-bit strings for different user-device profiles; it is 0 bits for the same profile. This demonstrates variability and reproducibility respectively. Montreal TestU01 tests binary string pseudorandom characteristics; the majority of tests pass showing pseudorandom number generator (PRG) characteristics.
引用
收藏
页码:208 / 229
页数:21
相关论文
共 50 条
  • [41] Behavioral Biometrics for Mobile User Authentication: Benefits and Limitations
    Papaioannou, Maria
    Mantas, Georgios
    Panaousis, Emmanouil
    Essop, Aliyah
    Rodriguez, Jonathan
    Sucasas, Victor
    2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING, 2023,
  • [42] Beyond the PIN: Enhancing user authentication for mobile devices
    Centre for Information Security and Network Research, University of Plymouth, Plymouth, United Kingdom
    Comput. Fraud Secur., 2008, 8 (12-17):
  • [43] Extreme Value Analysis for Mobile Active User Authentication
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 346 - 353
  • [44] User perspective and security of a new mobile authentication method
    Laka, Pawel
    Mazurczyk, Wojciech
    TELECOMMUNICATION SYSTEMS, 2018, 69 (03) : 365 - 379
  • [45] Survey on NonObstructive and Continuous User Authentication on Mobile Devices
    Lalithamani, N.
    Balaji, Raam
    Dev, S. V. P. K. H. Satya
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [46] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [47] Surveying the Development of Biometric User Authentication on Mobile Phones
    Meng, Weizhi
    Wong, Duncan S.
    Furnell, Steven
    Zhou, Jianying
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1268 - 1293
  • [48] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    IEEE ACCESS, 2022, 10 : 69757 - 69770
  • [49] Digital Memories Based Mobile User Authentication for IoT
    Shone, Nathan
    Dobbins, Chelsea
    Hurst, William
    Shi, Qi
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1797 - 1803
  • [50] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544