Progressive Authentication: Deciding When to Authenticate on Mobile Phones
نویسندگان
چکیده
Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but then have to inconveniently authenticate every time they use the device. Rather than exploring a new authentication scheme, we address the problem of deciding when to surface authentication and for which applications. We believe reducing the number of times a user is requested to authenticate lowers the barrier of entry for users who currently do not use any security. Progressive authentication, the approach we propose, combines multiple signals (biometric, continuity, possession) to determine a level of confidence in a user’s authenticity. Based on this confidence level and the degree of protection the user has configured for his applications, the system determines whether access to them requires authentication. We built a prototype running on modern phones to demonstrate progressive authentication and used it in a lab study with nine users. Compared to the state-of-theart, the system is able to reduce the number of required authentications by 42% and still provide acceptable security guarantees, thus representing an attractive solution for users who do not use any security mechanism on their devices.
منابع مشابه
لبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملBiometrics: The Future of Mobile Phones
Traditionally the use of codes or passwords have been used to authenticate access to mobile devices, but now the use of biometrics is increasingly being implemented. However is the use of biometrics a secure way to authenticate access to mobile devices. This paper provides insight into the different areas of biometrics, how they are now implemented on mobile devices as well as their advantages ...
متن کاملTouch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones
Nowadays, touchscreen mobile phones make up a larger and larger share in the mobile market. Users also often use their mobile phones (e.g., Android phones) to store personal and sensitive data. It is therefore important to safeguard mobile phones by authenticating legitimate users and detecting impostors. In this paper, we propose a novel user authentication scheme based on touch dynamics that ...
متن کاملCollaborative Bluetooth-based location authentication on smart phones
Third-party location-based services are independent of wireless carriers and receive the user location from mobile devices GPS. A major problem in this context is how to prevent service abuse by malicious users who submit false locations by tampering with their phones. This paper presents LINK (Location authentication through Immediate Neighbors Knowledge), a location authentication protocol wo...
متن کاملMental Trapdoors for User Authentication on Small Mobile Devices
As small mobile devices such as mobile phones become increasingly sophisticated, they are beginning to be used for highly securitysensitive applications such as payment systems, stock trading, and access control systems. The increasing importance of mobile phones exposes the tremendous lack of access control systems that restrict access to the legitimate user. In fact, a lost mobile phone “dele...
متن کامل