Dynamic multi-factor authentication for smartphone

作者: Alexander Yohan , Nai-Wei Lo , Henry Roes Lie

DOI: 10.1109/PIMRC.2016.7794966

关键词: AuthenticationPrivate propertyComputer scienceEntertainmentMulti-factor authenticationComputer securityInternet privacy

摘要: Nowadays, smartphone has become a vital tool for both productivity and entertainment that most people can't live without it. Due to the widespread usage of personal professional purposes, many consider them as private property. This means other should not be able freely gain access their smartphone, because it contains lot sensitive data. Therefore, its security is very important research area with potential benefit millions in world. A system protects owners from any breaches privacy needed ensure data inside device stays private. In this paper, we propose new securing smartphone. We incorporate multi-factor authentication method provide high security. Our also incorporates an implicit continuously authenticate user prevent unauthorized individuals accessing device. prototype based on proposed constructed.

参考文章(10)
Hassan Khan, Aaron Atwater, Urs Hengartner, A Comparative Evaluation of Implicit Authentication Schemes recent advances in intrusion detection. pp. 255- 275 ,(2014) , 10.1007/978-3-319-11379-1_13
Doina Precup, Jordan Frank, Shie Mannor, Activity and gait recognition with time-delay embeddings national conference on artificial intelligence. pp. 1581- 1586 ,(2010)
Ankita Khandelwal, A K Mohapatra, An insight into the security issues and their solutions for android phones international conference on computing for sustainable global development. pp. 106- 109 ,(2015)
Mojtaba Alizadeh, Wan Haslina Hassan, Touraj Khodadadi, Feasibility of Implementing Multi-factor Authentication Schemes in Mobile Cloud Computing international conference on intelligent systems, modelling and simulation. pp. 615- 618 ,(2014) , 10.1109/ISMS.2014.111
PN Ali Fahmi, Elyor Kodirov, Deok-Jai Choi, Guee-Sang Lee, A Mohd Fikri Azli, Shohel Sayeed, None, Implicit authentication based on ear shape biometrics using smartphone camera during a call 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC). pp. 2272- 2276 ,(2012) , 10.1109/ICSMC.2012.6378079
Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao, An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 2302- 2313 ,(2014) , 10.1109/TIFS.2014.2362979
Hossein Falaki, Ratul Mahajan, Srikanth Kandula, Dimitrios Lymberopoulos, Ramesh Govindan, Deborah Estrin, Diversity in smartphone usage international conference on mobile systems, applications, and services. pp. 179- 194 ,(2010) , 10.1145/1814433.1814453
Chen Sun, Yang Wang, Jun Zheng, Dissecting pattern unlock workshop on information security applications. ,vol. 19, pp. 308- 320 ,(2014) , 10.1016/J.JISA.2014.10.009
Farzana Rahman, Md Osman Gani, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed, Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices ieee international conference on software security and reliability companion. pp. 121- 129 ,(2014) , 10.1109/SERE-C.2014.30
G. Delac, M. Silic, J. Krolo, Emerging security threats for mobile platforms international convention on information and communication technology, electronics and microelectronics. pp. 1468- 1473 ,(2011)