Adversary Models for Mobile Device Authentication
نویسندگان
چکیده
Mobile device authentication has been a highly active research topic for over 10 years, with vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user strong, systematic, increasingly formal threat models have established are used to qualitatively compare different methods. However, the analysis mobile is often based on weak adversary models, suggesting overly optimistic results their respective security. this article, we introduce new classification adversaries better analyze We apply systematic literature survey. The survey shows that security still an afterthought most protocols lack comprehensive analysis. provides strong practical model offers comparable transparent properties in authentication.
منابع مشابه
Mobile Device based Authentication
Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...
متن کاملAuthentication With a Guessing Adversary
In this paper, we consider the authentication problem where a candidate measurement presented by an unidentified user is compared to a previously stored measurement of the legitimate user, the enrollment, with respect to a certain distortion criteria for authentication. An adversary wishes to impersonate the legitimate user by guessing the enrollment until the system authenticates him. For this...
متن کاملA New Approach to Mobile Device Authentication
The effectiveness of primary and secondary authentication systems on mobile devices leaves room for improvement. Device manufacturers provide security features which require users to memorize long, complex passwords and/or provide biometric information. These approaches have drawbacks which make their continued usage untenable. Users are already inundated with passwords and regularly forget ans...
متن کاملEnhancing CardSpace Authentication Using a Mobile Device
In this paper we propose a simple, novel scheme for using a mobile device to enhance CardSpace authentication. During the process of user authentication on a PC using CardSpace, a random and shortlived one-time password is sent to the user’s mobile device; this must then be entered into the PC by the user when prompted. The scheme does not require any changes to login servers, the CardSpace ide...
متن کاملExtending Formal Analysis of Mobile Device Authentication
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications must rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. Much of the focus in development of new applications in this area seeks to reduce or eliminate the impact of this additional ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2021
ISSN: ['0360-0300', '1557-7341']
DOI: https://doi.org/10.1145/3477601