A Usable and Robust Continuous Authentication Framework Using Wearables

作者: Abbas Acar , Hidayet Aksu , A. Selcuk Uluagac , Kemal Akkaya

DOI: 10.1109/TMC.2020.2974941

关键词:

摘要: One-time login process in conventional authentication systems does not guarantee that the identified user is actual throughout session. However, it necessary to re-verify identity periodically a session, which lacking existing one-time systems. Continuous , re-verifies without breaking continuity of can address this issue. methods for Authentication are either reliable or usable. In paper, we introduce usable and Wearable-Assisted (WACA), relies on sensor-based keystroke dynamics data acquired through built-in sensors wearable (e.g., smartwatch) while typing. The transparently compared with registered profile initially logged-in one-way classifiers. With this, WACA continuously ensures current who initially. We implemented framework evaluated its performance extensively real devices users. empirical evaluation reveals feasible, error rate as low 1 percent 30 seconds processing time 2-3 20 seconds. computational overhead minimal. Furthermore, capable identifying insider threats very high accuracy (99.2 percent) also robust against powerful adversaries such imitation statistical attackers. believe work has practical far-reaching implications future field.

参考文章(47)
Chee Meng Tey, Debin Gao, Payas Gupta, I Can Be You: Questioning the Use of Keystroke Dynamics as Biometrics network and distributed system security symposium. pp. 1- ,(2013)
Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani, HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users IEEE Transactions on Information Forensics and Security. ,vol. 11, pp. 877- 892 ,(2016) , 10.1109/TIFS.2015.2506542
Cassandra M. Carrillo, CONTINUOUS BIOMETRIC AUTHENTICATION FOR AUTHORIZED AIRCRAFT PERSONNEL: A PROPOSED DESIGN Monterey, California. Naval Postgraduate School. ,(2003)
Geraldine Kwang, Roland H. C. Yap, Terence Sim, Rajiv Ramnath, An Usability Study of Continuous Biometrics Authentication international conference on biometrics. pp. 828- 837 ,(2009) , 10.1007/978-3-642-01793-3_84
Hang-Bong Kang, Myung-Ho Ju, Multi-modal Feature Integration for Secure Authentication Lecture Notes in Computer Science. pp. 1191- 1200 ,(2006) , 10.1007/11816157_148
Simon Eberz, Kasper B. Rasmussen, Vincent Lenders, Ivan Martinovic, Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23203
Eric Grosse, Mayank Upadhyay, Authentication at Scale ieee symposium on security and privacy. ,vol. 11, pp. 15- 22 ,(2013) , 10.1109/MSP.2012.162
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano, The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes ieee symposium on security and privacy. pp. 553- 567 ,(2012) , 10.1109/SP.2012.44
Abdul Serwadda, Vir V Phoha, Zibo Wang, None, Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms international conference on biometrics theory applications and systems. pp. 1- 8 ,(2013) , 10.1109/BTAS.2013.6712758
Pin Shen Teh, Andrew Beng Jin Teoh, Shigang Yue, A survey of keystroke dynamics biometrics The Scientific World Journal. ,vol. 2013, pp. 408280- 408280 ,(2013) , 10.1155/2013/408280