Answering Incoming Call for Implicit Authentication Using Smartphone

نویسندگان

  • M. F. A. ABDULLAH
  • H. K. BASHIER
  • S. SAYEED
  • I. YUSOF
  • A. AZMAN
  • S. Z. IBRAHIM
چکیده

Smartphones are being used to keep sensitive data and make private transaction other than making calls and receive short messages. Thus, authentication of the smartphones becomes very crucial and important aspect. However, users feel inconvenience and difficult with current authentication methods, from password up to physical biometrics. Implicit authentication system emerged intending to improve the security and convenience of the smartphone users. One of the approaches is considering the way users answer incoming phone calls using their smartphones. We study and evaluate the voice signal from users when answering incoming phone calls. Our study shows that the voice signals capable of authenticating the smartphone users. The experiment conducted shows a very high performance with 98.9% accuracy. These findings will promisingly augment that the novel implicit and transparent authentication system based on voices of answering incoming phone calls is feasible so that authentication of smartphone’s users become easier and unobtrusive.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication through Smartwatch and Smartphone

Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...

متن کامل

Evaluating the Use of Autobiographical Memory for Authentication

This paper takes a first step in exploring what we call autobiographical authentication, using data about events and activities that are easily captured by smartphones and other devices as the basis for authentication. More specifically, this paper reports on two studies. The first study looked at understanding and categorizing what kinds of everyday memories people could recall, using the resu...

متن کامل

Mobile Device based Authentication

Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Privacy concerns of implicit secondary factors for web authentication

These implicit factors can help transform authentication from a binary decision problem (based on passwords alone) into a classification problem with a spectrum of possible decisions. For example, unusual values for implicit factors can be used as an indicator to detect merely suspicious logins for which additional explicit authentication actions (such as sending an SMS code) can be taken. Alte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014