Implicit sensor-based authentication of smartphone users with smartwatch

Wei Han Lee, Ruby Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login mechanism, it is highly desirable to re-authenticate endusers who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, this paper proposes a novel authentication system, iAuth, for implicit, continuous authentication of the end-user based on his or her behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We design a system that gives accurate authentication using machine learning and sensor data from multiple mobile devices. Our system can achieve 92.1% authentication accuracy with negligible system overhead and less than 2% battery consumption.

Original languageEnglish (US)
Title of host publicationHardware and Architectural Support for Security and Privacy, HASP 2016
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450347693
DOIs
StatePublished - Jun 18 2016
Event5th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2016 - Seoul, Korea, Republic of
Duration: Jun 18 2016 → …

Publication series

NameACM International Conference Proceeding Series
Volume18-June-2016

Other

Other5th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2016
Country/TerritoryKorea, Republic of
CitySeoul
Period6/18/16 → …

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Implicit sensor-based authentication of smartphone users with smartwatch'. Together they form a unique fingerprint.

Cite this