TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition
نویسندگان
چکیده
Transparent authentication (TA) schemes are those in which a user is authenticated by a verifier without requiring explicit user interaction. Those schemes promise high usability and security simultaneously. Many TA schemes rely on the received signal strength as an indicator for the proximity of a user device (prover). However, such implicit proximity verification is not secure against an adversary who can relay messages. In this paper, we propose a novel approach for thwarting relay attacks in TA schemes: the prover permits access to authentication credentials only if it can confirm that it is near the verifier. We present TRec, a system for relay-resilient transparent authentication in which the prover does proximity verification by identifying its approach trajectory to the intended verifier and comparing it with known authorized reference trajectories. Trajectories are measured using low-cost sensors commonly available on personal devices. We demonstrate the security of TRec against a class of adversaries and its ease-of-use by analyzing empirical data, collected using a TRec prototype. TRec is efficient and can be easily integrated into existing TA schemes.
منابع مشابه
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
Many mobile and wireless authentication systems are prone to relay attacks whereby two non co-presence colluding entities can subvert the authentication functionality by simply relaying the data between a legitimate prover (P) and verifier (V). Examples include payment systems involving NFC and RFID devices, and zero-interaction token-based authentication approaches. Utilizing the contextual in...
متن کاملSelf-Organized Efficient Authentication and Key Management Scheme for Multihop Relay Networks
Wireless internet services are quickly intensifying and improving, it is significant to provide users with not only high speed and high quality wireless service but also secured. Multihop relay-based support was added, which not only help for improving coverage and throughput but also provides features such as lower backhaul deployment cost, easy setup, robustness and re-configurability, which ...
متن کاملFace Recognition Using Thermal Image Watermarking Algorithm for Verifying the Security Issues of Teleradiology
1 Watermarking is the supreme chance from many reasearches around the world.It is the process of stagenography or embedding process.Digital watermarks can be used by a lot of applications like:copyright protection, data security, and data hiding and conveys other information etc.The Watermarking project security is improved by facial signature authentication using thermal image technique.A new ...
متن کاملAn Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate prover. We present an authentication protocol suited for RFID systems. Our solution is the first that prevents relay attacks without degrading the authentication security level: it minimizes the probability that the verifier a...
متن کاملAuthentication Using Side-Channel Information
Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1610.02801 شماره
صفحات -
تاریخ انتشار 2016