TY - GEN
T1 - Implicit sensor-based authentication of smartphone users with smartwatch
AU - Lee, Wei Han
AU - Lee, Ruby
N1 - Publisher Copyright:
© 2016 ACM.
PY - 2016/6/18
Y1 - 2016/6/18
N2 - Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login mechanism, it is highly desirable to re-authenticate endusers who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, this paper proposes a novel authentication system, iAuth, for implicit, continuous authentication of the end-user based on his or her behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We design a system that gives accurate authentication using machine learning and sensor data from multiple mobile devices. Our system can achieve 92.1% authentication accuracy with negligible system overhead and less than 2% battery consumption.
AB - Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login mechanism, it is highly desirable to re-authenticate endusers who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, this paper proposes a novel authentication system, iAuth, for implicit, continuous authentication of the end-user based on his or her behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We design a system that gives accurate authentication using machine learning and sensor data from multiple mobile devices. Our system can achieve 92.1% authentication accuracy with negligible system overhead and less than 2% battery consumption.
UR - http://www.scopus.com/inward/record.url?scp=84983388841&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84983388841&partnerID=8YFLogxK
U2 - 10.1145/2948618.2948627
DO - 10.1145/2948618.2948627
M3 - Conference contribution
AN - SCOPUS:84983388841
T3 - ACM International Conference Proceeding Series
BT - Hardware and Architectural Support for Security and Privacy, HASP 2016
PB - Association for Computing Machinery
T2 - 5th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2016
Y2 - 18 June 2016
ER -