TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition

نویسندگان

  • Mika Juuti
  • Christian Vaas
  • Ivo Sluganovic
  • Hans Liljestrand
  • N. Asokan
  • Ivan Martinovic
چکیده

Transparent authentication (TA) schemes are those in which a user is authenticated by a verifier without requiring explicit user interaction. Those schemes promise high usability and security simultaneously. Many TA schemes rely on the received signal strength as an indicator for the proximity of a user device (prover). However, such implicit proximity verification is not secure against an adversary who can relay messages. In this paper, we propose a novel approach for thwarting relay attacks in TA schemes: the prover permits access to authentication credentials only if it can confirm that it is near the verifier. We present TRec, a system for relay-resilient transparent authentication in which the prover does proximity verification by identifying its approach trajectory to the intended verifier and comparing it with known authorized reference trajectories. Trajectories are measured using low-cost sensors commonly available on personal devices. We demonstrate the security of TRec against a class of adversaries and its ease-of-use by analyzing empirical data, collected using a TRec prototype. TRec is efficient and can be easily integrated into existing TA schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing

Many mobile and wireless authentication systems are prone to relay attacks whereby two non co-presence colluding entities can subvert the authentication functionality by simply relaying the data between a legitimate prover (P) and verifier (V). Examples include payment systems involving NFC and RFID devices, and zero-interaction token-based authentication approaches. Utilizing the contextual in...

متن کامل

Self-Organized Efficient Authentication and Key Management Scheme for Multihop Relay Networks

Wireless internet services are quickly intensifying and improving, it is significant to provide users with not only high speed and high quality wireless service but also secured. Multihop relay-based support was added, which not only help for improving coverage and throughput but also provides features such as lower backhaul deployment cost, easy setup, robustness and re-configurability, which ...

متن کامل

Face Recognition Using Thermal Image Watermarking Algorithm for Verifying the Security Issues of Teleradiology

1 Watermarking is the supreme chance from many reasearches around the world.It is the process of stagenography or embedding process.Digital watermarks can be used by a lot of applications like:copyright protection, data security, and data hiding and conveys other information etc.The Watermarking project security is improved by facial signature authentication using thermal image technique.A new ...

متن کامل

An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks

Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier a...

متن کامل

Authentication Using Side-Channel Information

Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1610.02801  شماره 

صفحات  -

تاریخ انتشار 2016