Smartwatch User Identification as a Means of Authentication

نویسندگان

  • Scott Davidson
  • Derrick Smith
  • Chen Yang
  • Sebastian Cheah
چکیده

User provided passwords are a sources of insecurity in existing computer systems due to a compromise between security and ease of use. Multi-factor authentication attempts to strengthen this weakness, but users fail to implement it due to inconvenience. One possible solution is to use gestures as a form of authentication. We show that it is possible to distinguish between gestures as well as distinguishing between users performing the same gesture. Thus, a gesture based second level authentication scheme is a viable solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...

متن کامل

WACA: Wearable-Assisted Continuous Authentication

One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable...

متن کامل

Authentication through Smartwatch and Smartphone

Smartphones now-a-days are used mainly for surfing the web, checking social networks or playing games than making a phone call, which is only the fifth most frequent activity [5]. This means that users trust their smartphones to store and access sensitive data, ranging from contacts to financial details [3] (indeed 35% use their devices for online banking [2]). Moreover, a typical user now has ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics

Zero-interaction authentication (ZIA) refers to a form of user-transparent login mechanism using which a terminal (e.g., a desktop computer) can be unlocked by the mere proximity of an authentication token (e.g., a smartphone). Given its appealing usability, ZIA has already been deployed in many real-world applications. However, ZIA contains one major security weakness — unauthorized physical a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016