Abstrakti
Users usually authenticate to mobile devices before using them (e.g. PIN, password), but devices do not do the same to users. Revealing the authentication secret to a non-authenticated device potentially enables attackers to obtain the secret, by replacing the device with an identical-looking malicious device. The revealed authentication secret could be transmitted to the attackers immediately, who then conveniently authenticate to the real device. Addressing this attack scenario, we analyze different approaches towards mobile device-to-user (D2U) authentication, for which we provide an overview of advantages/drawbacks, potential risks and device authentication data bandwidth estimations. We further analyze vibration as one D2U feedback channel that is unobtrusive and hard to eavesdrop, including a user study to estimate vibration pattern recognition using a setup of '7 bits per second (b/s). Study findings indicate that users are able to distinguish vibration patterns with median correctness of 97.5% (without taking training effects into account) - which indicates that vibration could act as authentication feedback channel and should be investigated further in future research.
Alkuperäiskieli | Englanti |
---|---|
Otsikko | MUM 2015 - Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia |
Toimittajat | Enrico Rukzio, Michael Roland, Rene Mayrhofer, Clemens Holzmann, Jonna Hakkila |
Kustantaja | ACM |
Sivut | 131-135 |
Sivumäärä | 5 |
Vuosikerta | 30-November-2015 |
ISBN (elektroninen) | 9781450336055 |
DOI - pysyväislinkit | |
Tila | Julkaistu - 30 marraskuuta 2015 |
OKM-julkaisutyyppi | A4 Artikkeli konferenssijulkaisuussa |
Tapahtuma | International Conference on Mobile and Ubiquitous Multimedia - Linz, Itävalta Kesto: 30 marraskuuta 2015 → 2 joulukuuta 2015 Konferenssinumero: 14 |
Conference
Conference | International Conference on Mobile and Ubiquitous Multimedia |
---|---|
Lyhennettä | MUM |
Maa | Itävalta |
Kaupunki | Linz |
Ajanjakso | 30/11/2015 → 02/12/2015 |