A Proximity Authentication System for Smartphones
نویسندگان
چکیده
منابع مشابه
Unobservable Re-authentication for Smartphones
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are becoming a personal entrance to networks, and may store private information. Due to its small size, a smartphone could be easily taken away and used by an attacker. Using a victim’s smartphone, the attacker can launch an impersonation attack, which threatens the security of current networks, esp...
متن کاملIntroducing touchstroke: keystroke-based authentication system for smartphones
Keystroke dynamics is a well-investigated behavioral biometric based on the way and rhythm in which someone interacts with a keyboard or keypad when typing characters. This paper explores the potential of this modality but for touchscreenequipped smartphones. The main research question posed is whether “touchstroking” can be effective in building the biometric profile of a user, in terms of typ...
متن کاملUnsupervised Proximity Detection and Pairing for Smartphones
User context, especially physical proximity, is gaining its popularity as an intelligent indicator to trigger communication between devices. Apple’s iBeacon sends out notification to iPhones when customers enter their Apple stores. It detects proximity by ranging Bluetooth beacon signals emitted from anchor nodes that are preinstalled in the store. Many short-range communication methods adopted...
متن کاملUnder the table: tap authentication for smartphones
Current smartphone authentication methods are known to be susceptible to even rudimentary attacks based on observation. In this paper, we propose an approach to authentication based on rich tapping patterns that addresses this problem. We present a novel tapping detection technique, using a single example as a template. We also report on two user studies (N = 30 and N = 19) where tapping authen...
متن کاملUser Authentication in Smartphones for Telehealth
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Heal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2016
ISSN: 1545-5971
DOI: 10.1109/tdsc.2015.2427848