Authentication through Smartwatch and Smartphone

نویسنده

  • Swadhin Pradhan
چکیده

Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has around 25 accounts but only 6.5 unique [9] but not-so-strong passwords [1] to protect these accounts. At the same time, smartphones are prone to loss: a 2012 report by the Pew Internet Project estimated that nearly a third of cell phone users have had a device lost or stolen [6]. Still 35% of the users do not lock their smartphones [16] which can put all their accounts and sensitive information at risk. The main reason behind this lazy locking behavior is the need of unlocking their devices around 110 times a day [4]. However, users want to preserve their privacy from strangers or family members [3], but they also crave for fewer taps to access their desired information. This eternal trade-off between usability and security can be resolved if we have implicit authentication system powered by higher level of security. So, to solve this, different online services are using two-factor authentication to make the security tighter.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

Recurrent neural networks (RNNs) have shown promising results in audio and speech processing applications due to their strong capabilities in modelling sequential data. In many applications, RNNs tend to outperform conventional models based on GMM/UBMs and i-vectors. Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics...

متن کامل

Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics

Zero-interaction authentication (ZIA) refers to a form of user-transparent login mechanism using which a terminal (e.g., a desktop computer) can be unlocked by the mere proximity of an authentication token (e.g., a smartphone). Given its appealing usability, ZIA has already been deployed in many real-world applications. However, ZIA contains one major security weakness — unauthorized physical a...

متن کامل

Securing Two-factor Authentication for Smartphones in a Usable Way by Adding a Connected Token

Todays two-factor authentication solutions for smartphones either rely on a replaceable smartcard or a trusted execution environment such as TrustZone. The user has to enter a pin or passcode into the device to authenticate himself. Research has shown that this method is easy to break. An attacker can easily spy on the secret through logging the input, recording screen reflections [1] or derivi...

متن کامل

Smartwatches Locking Methods: A Comparative Study

Smartwatches are rapidly emerging to be the next generation of personal devices from the smartphone era due to their novel form factor and broad applications. However, their emergence also poses new challenges to securing user information. An important challenge is preventing unauthorized access to private information stored on the watch, for which a locking method is typically used. Due to sma...

متن کامل

Human Activity Recognition Using Smartphone and Smartwatch

Human activity recognition is influential subject in different fields of human daily life especially in the mobile health. As the smartphone becomes an integrated part of human daily life which has the ability of complex computation, internet connection and also contains a large number of hardware sensors, encourage implementation of the human activity recognition system. Most of the works done...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015