Towards device-to-user authentication: Protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns

Rainhard Dieter Findling, René Mayrhofer

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)

Abstract

Users usually authenticate to mobile devices before using them (e.g. PIN, password), but devices do not do the same to users. Revealing the authentication secret to a non-authenticated device potentially enables attackers to obtain the secret, by replacing the device with an identical-looking malicious device. The revealed authentication secret could be transmitted to the attackers immediately, who then conveniently authenticate to the real device. Addressing this attack scenario, we analyze different approaches towards mobile device-to-user (D2U) authentication, for which we provide an overview of advantages/drawbacks, potential risks and device authentication data bandwidth estimations. We further analyze vibration as one D2U feedback channel that is unobtrusive and hard to eavesdrop, including a user study to estimate vibration pattern recognition using a setup of '7 bits per second (b/s). Study findings indicate that users are able to distinguish vibration patterns with median correctness of 97.5% (without taking training effects into account) - which indicates that vibration could act as authentication feedback channel and should be investigated further in future research.

Original languageEnglish
Title of host publicationMUM 2015 - Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia
EditorsEnrico Rukzio, Michael Roland, Rene Mayrhofer, Clemens Holzmann, Jonna Hakkila
PublisherACM
Pages131-135
Number of pages5
Volume30-November-2015
ISBN (Electronic)9781450336055
DOIs
Publication statusPublished - 30 Nov 2015
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Mobile and Ubiquitous Multimedia - Linz, Austria
Duration: 30 Nov 20152 Dec 2015
Conference number: 14

Conference

ConferenceInternational Conference on Mobile and Ubiquitous Multimedia
Abbreviated titleMUM
CountryAustria
CityLinz
Period30/11/201502/12/2015

Keywords

  • Feedback
  • Mobile authentication
  • Phishing hardware
  • Vibration

Fingerprint Dive into the research topics of 'Towards device-to-user authentication: Protecting against phishing hardware by ensuring mobile device authenticity using vibration patterns'. Together they form a unique fingerprint.

Cite this