Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

User authentication on mobile devices: : Approaches, threats and trends

Published: 07 April 2020 Publication History

Abstract

Mobile devices have brought a great convenience to us these years, which allow the users to enjoy the anytime and anywhere various applications such as the online shopping, Internet banking, navigation and mobile media. While the users enjoy the convenience and flexibility of the ”Go Mobile” trend, their sensitive private information (e.g., name and credit card number) on the mobile devices could be disclosed. An adversary could access the sensitive private information stored on the mobile device by unlocking the mobile devices. Moreover, the user’s mobile services and applications are all exposed to security threats. For example, the adversary could utilize the user’s mobile device to conduct non-permitted actions (e.g., making online transactions and installing malwares). The authentication on mobile devices plays a significant role to protect the user’s sensitive information on mobile devices and prevent any non-permitted access to the mobile devices. This paper surveys the existing authentication methods on mobile devices. In particular, based on the basic authentication metrics (i.e., knowledge, ownership and biometrics) used in existing mobile authentication methods, we categorize them into four categories, including the knowledge-based authentication (e.g., passwords and lock patterns), physiological biometric-based authentication (e.g., fingerprint and iris), behavioral biometrics-based authentication (e.g., gait and hand gesture), and two/multi-factor authentication. We compare the usability and security level of the existing authentication approaches among these categories. Moreover, we review the existing attacks to these authentication approaches to reveal their vulnerabilities. The paper points out that the trend of the authentication on mobile devices would be the multi-factor authentication, which determines the user’s identity using the integration (not the simple combination) of more than one authentication metrics. For example, the user’s behavior biometrics (e.g., keystroke dynamics) could be extracted simultaneously when he/she inputs the knowledge-based secrets (e.g., PIN), which can provide the enhanced authentication as well as sparing the user’s trouble to conduct multiple inputs for different authentication metrics.

References

[1]
Statista. Number of mobile phone users worldwide from 2015 to 2020 (in billions), 2018. https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/.
[2]
X. Suo, Y. Zhu, G.S. Owen, Graphical passwords: a survey, Proceedings of the 21st Annual Computer Security Applications Conference, IEEE, 2005.
[3]
T. Farnaz, M. Masrom, A Survey on Recognition Based Graphical User Authentication Algorithms, (IJCSIS) International Journal of Computer Science and Information Security 6 (2) (2009).
[4]
R. Spolaor, Q. Li, M. Monaro, M. Conti, L. Gamberini, G. Sartori, Biometric authentication methods on smartphones: asurvey., PsychNology J. 14 (2) (2016).
[5]
A. Mahfouz, T.M. Mahmoud, A.S. Eldin, A survey on behavioral biometric authentication on smartphones, J. Inform. Secur. Appl. 37 (2017) 28–37.
[6]
P.S. Teh, N. Zhang, A.B.J. Teoh, K. Chen, A survey on touch dynamics authentication in mobile devices, Comput. Secur. 59 (2016) 210–235.
[7]
R. Saifan, A. Salem, D. Zaidan, A. Swidan, A survey of behavioral authentication using keystroke dynamics: touch screens and mobile devices, J. Soc. Sci. (COES&RJ-JSS) 5 (2016) 29–41.
[8]
D. Kunda, M. Chishimba, A survey of android mobile phone authentication schemes, Mob. Netw. Appl. (2018) 1–9.
[9]
L. O’Gorman, Comparing passwords, tokens, and biometrics for user authentication, Proceed. IEEE 91 (12) (2003) 2021–2040.
[10]
S. Uellenbeck, M. Dürmuth, C. Wolf, T. Holz, Quantifying the security of graphical passwords: the case of android unlock patterns, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM, 2013, pp. 161–172.
[11]
S. Chiasson, P.C. van Oorschot, R. Biddle, Graphical password authentication using cued click points, Computer Security–ESORICS 2007, Springer, 2007, pp. 359–374.
[12]
A.J. Aviv, K.L. Gibson, E. Mossop, M. Blaze, J.M. Smith, Smudge attacks on smartphone touch screens., Woot 10 (2010) 1–7.
[13]
D.X. Song, D. Wagner, X. Tian, Timing analysis of keystrokes and timing attacks on ssh., USENIX Security Symposium, 2001, 2001.
[14]
E. Miluzzo, A. Varshavsky, S. Balakrishnan, R.R. Choudhury, Tapprints: your finger taps have fingerprints, ACM Mobisys, 2012, pp. 323–336.
[15]
M. Li, Y. Meng, J. Liu, H. Zhu, X. Liang, Y. Liu, N. Ruan, When csi meets public wifi: Inferring your mobile phone password via wifi signals, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 1068–1079.
[16]
C. Tsikos, inventor, Siemens Corp, Assignee. Capacitive Fingerprint Sensor. United States Patent US 4,353,056 5 (1982 Oct).
[17]
A. Bud, Facing the future: The impact of Apple FaceID, Biometric Technology Today 12018 (1) (2018 Jan) 5–7.
[18]
M. GallesoSamsung, Galaxy Note 7: An Easy Guide to the Best Features, First Rank Publishing, 2016 Oct 20.
[19]
R. Raghavendra, C. Busch, B. Yang, Scaling-robust fingerprint verification with smartphone camera in real-life scenarios, 2013 IEEE Sixth International Conference on Biometrics, Theory, Applications and Systems (BTAS), IEEE, 2013, pp. 1–8.
[20]
S. Thavalengal, P. Bigioi, P. Corcoran, Iris authentication in handheld devices-considerations for constraint-free acquisition, IEEE Trans Consum. Electron. 61 (2) (2015) 245–253.
[21]
L. Yuan, Z. chun Mu, Ear recognition based on local information fusion, Patt. Recognit. Lett. 33 (2) (2012) 182–190.
[22]
E. Von Zezschwitz, A. Koslow, A. De Luca, H. Hussmann, Making graphic-based authentication secure against smudge attacks, Proceedings of the 2013 international conference on Intelligent user interfaces, ACM, 2013, pp. 277–286.
[23]
J. Määttä, A. Hadid, M. Pietikäinen, Face spoofing detection from single images using micro-texture analysis, Biometrics (IJCB), 2011 international joint conference on, IEEE, 2011, pp. 1–7.
[24]
N. Erdogmus, S. Marcel, Spoofing face recognition with 3d masks, IEEE Trans. Inform. Forensic. Secur. 9 (7) (2014) 1084–1097.
[25]
D. Kim, P. Dunphy, P. Briggs, J. Hook, J.W. Nicholson, J. Nicholson, P. Olivier, Multi-touch authentication on tabletops, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 2010, pp. 1093–1102.
[26]
L. Li, X. Zhao, G. Xue, Unobservable re-authentication for smartphones, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013.
[27]
S.M. Bellovin, M. Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE, 1992, pp. 72–84.
[28]
Duran, What is Shoulder Surfing? Tips to Prevent Shoulder Surfing Password Attacks, 2018, https://www.cyclonis.com/what-shoulder-surfing-tips-prevent-shoulder-surfing-password-attacks/.
[29]
P.C. Kocher, Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, Annual International Cryptology Conference, Springer, 1996, pp. 104–113.
[30]
K. Gandolfi, C. Mourtel, F. Olivier, Electromagnetic analysis: Concrete results, International workshop on cryptographic hardware and embedded systems, Springer, 2001, pp. 251–261.
[31]
L. Cai, H. Chen, Touchlogger: Inferring keystrokes on touch screen from smartphone motion, USENIX HotSec, 2011.
[32]
E. Owusu, J. Han, S. Das, A. Perrig, J. Zhang, Accessory: password inference using accelerometers on smartphones, ACM HotMobile, 2012, pp. 9:1–9:6.
[33]
C. Wang, X. Guo, Y. Wang, Y. Chen, B. Liu, Friend or foe?: Your wearable devices reveal your personal pin, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ACM, 2016, pp. 189–200.
[34]
R. Morris, K. Thompson, Password security: a case history, Commun. ACM 22 (11) (1979) 594–597.
[36]
E.H. Spafford, et al., Opus: preventing weak password choices., Comput. Secur. 11 (3) (1992) 273–278.
[37]
F. Pesce, Discovered Patterns in Numeric Passwords Raise New Questions, 2012, https://blog.qualys.com/author/fpesce.
[38]
M. Dell’Amico, P. Michiardi, Y. Roudier, Password strength: an empirical analysis, Proceedings of the Annual IEEE International Conference on Computer Communications (IEEE INFOCOM), IEEE, 2010, pp. 1–9.
[39]
J. Bonneau, S. Preibusch, R. Anderson, A birthday present every eleven wallets? the security of customer-chosen banking pins, International Conference on Financial Cryptography and Data Security, Springer, 2012, pp. 25–40.
[40]
S. Schechter, C. Herley, M. Mitzenmacher, Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks, Proceedings of the 5th USENIX Conference on Hot Topics in Security, USENIX Association, 2010, pp. 1–8.
[41]
C. Castelluccia, M. Dürmuth, D. Perito, Adaptive password-strength meters from markov models., NDSS, 2012.
[42]
P.G. Kelley, S. Komanduri, M.L. Mazurek, R. Shay, T. Vidas, L. Bauer, N. Christin, L.F. Cranor, J. Lopez, Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms, Security and Privacy (SP), 2012 IEEE Symposium on, IEEE, 2012, pp. 523–537.
[43]
A. Perrig, D. Song, Hash visualization: a new technique to improve real-world security, International Workshop on Cryptographic Techniques and E-Commerce, 1999, pp. 131–138.
[44]
R. Dhamija, A. Perrig, Deja vu-a user study: using images for authentication, USENIX Security Symposium, 2000.
[45]
A. De Angeli, M. Coutts, L. Coventry, G.I. Johnson, D. Cameron, M.H. Fischer, Vip: a visual approach to user authentication, Proceedings of the working conference on advanced visual interfaces (ACM AVI), 2002, pp. 316–323.
[46]
G.E. Blonder, inventor, Nokia of America Corp, Assignee. Graphical Password. United States Patent US 5,559,961 24 (1996 Sep).
[47]
S. Brostoff, M.A. Sasse, Are passfaces more usable than passwords? a field trial investigation, People and Computers XIV?Usability or Else!, Springer, 2000, pp. 405–424.
[48]
W. Jansen, S.I. Gavrila, V. Korolev, R.P. Ayers, R. Swanstrom, Picture password: a visual login technique for mobile devices, Technical Report, 2003.
[49]
W. Jansen, Authenticating mobile device users through image selection, WIT Trans. Inform. Commun. Technol. 30 (2004).
[50]
D. Davis, F. Monrose, M.K. Reiter, On user choice in graphical password schemes., USENIX Security Symposium, 13, 2004.
[51]
H. Sun, K. Wang, X. Li, N. Qin, Z. Chen, Passapp: my app is my password!, Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, ACM, 2015, pp. 306–315.
[52]
I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter, A.D. Rubin, The Design and Analysis of Graphical Passwords., USENIX Association, 1999.
[53]
M. Sherman, G. Clark, Y. Yang, S. Sugrim, A. Modig, J. Lindqvist, A. Oulasvirta, T. Roos, User-generated free-form gestures for authentication: Security and memorability, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, ACM, 2014, pp. 176–189.
[54]
N. Sae-Bae, N. Memon, Online signature verification on mobile devices, IEEE Trans. Inform. Forensic. Secur. (2014).
[55]
A.E. Dirik, N. Memon, J.-C. Birget, Modeling user choice in the passpoints graphical password scheme, Proceedings of the 3rd symposium on Usable privacy and security, ACM, 2007, pp. 20–28.
[56]
S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, N. Memon, Authentication using graphical passwords: effects of tolerance and image choice, Proceedings of the 2005 Symposium on Usable Privacy and Security, ACM, 2005, pp. 1–12.
[57]
J. Long, No Tech Hacking: Aguide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Syngress, 2011.
[58]
M. Eiband, M. Khamis, E. Von Zezschwitz, H. Hussmann, F. Alt, Understanding shoulder surfing in the wild: Stories from users and observers, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, 2017, pp. 4254–4265.
[59]
M. Hlywa, R. Biddle, A.S. Patrick, Facing the facts about image type in recognition-based graphical passwords, Proceedings of the 27th Annual Computer Security Applications Conference, ACM, 2011, pp. 149–158.
[60]
G. Ye, Z. Tang, D. Fang, X. Chen, K.I. Kim, B. Taylor, Z. Wang, Cracking Android Pattern Lock in Five Attempts, Internet Society, 2017.
[61]
F. Schaub, R. Deyhle, M. Weber, Password entry usability and shoulder surfing susceptibility on different smartphone platforms, Proceedings of the 11th international conference on mobile and ubiquitous multimedia, ACM, 2012, p. 13.
[62]
M. Harbach, A. De Luca, S. Egelman, The anatomy of smartphone unlocking: a field study of android lock screens, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, 2016, pp. 4806–4817.
[63]
J. Sun, X. Jin, Y. Chen, J. Zhang, Y. Zhang, R. Zhang, Visible: Video-assisted keystroke inference from tablet backside motion., NDSS, 2016.
[64]
W. Diao, X. Liu, Z. Li, K. Zhang, No pardon for the interruption: New inference attacks on android through interrupt timing analysis, Security and Privacy (SP), 2016 IEEE Symposium on, IEEE, 2016, pp. 414–432.
[65]
A.J. Aviv, B. Sapp, M. Blaze, J.M. Smith, Practicality of accelerometer side channels on smartphones, Proceedings of the 28th Annual Computer Security Applications Conference, ACM, 2012, pp. 41–50.
[66]
R. Spreitzer, Pin skimming: Exploiting the ambient-light sensor in mobile devices, Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, ACM, 2014, pp. 51–62.
[67]
H. Wang, T.T.-T. Lai, R. Roy Choudhury, Mole: Motion leaks through smartwatch sensors, ACM MobiCom, 2015, pp. 155–166.
[68]
X. Liu, Z. Zhou, W. Diao, Z. Li, K. Zhang, When good becomes evil: Keystroke inference with smartwatch, Proceedings of the 22nd ACM Conference on Computer and Communications Security (ACM CCS), 2015, pp. 1273–1285.
[69]
C. Wang, J. Liu, X. Guo, Y. Wang, Y. Chen, Poster: Inferring mobile payment passcodes leveraging wearable devices, Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, ACM, 2018, pp. 789–791.
[70]
I. Cherapau, I. Muslukhov, N. Asanka, K. Beznosov, On the impact of touch id on iphone passcodes., in: Symposium on Usable Privacy and Security (SOUPS), 2015, pp. 257–276.
[71]
M. Ricknäs, Fingerprint sensors on their way to more smartphones, IDG Communications (2015) https://www.pcworld.com/article/2938792/fingerprint-sensors-on-their-way-to-more-smartphones.html.
[72]
D. Lee, K. Choi, H. Choi, J. Kim, Recognizable-image selection for fingerprint recognition with a mobile-device camera, IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 38 (1) (2008) 233–243.
[73]
Y. Han, T. Tan, Z. Sun, Y. Hao, Embedded palmprint recognition system on mobile devices, International Conference on Biometrics, Springer, 2007, pp. 1184–1193.
[74]
C. Methani, A.M. Namboodiri, Pose invariant palmprint recognition, International Conference on Biometrics, Springer, 2009, pp. 577–586.
[75]
A. de Santos Sierra, J.G. Casanova, C.S. Avila, V.J. Vera, Silhouette-based hand recognition on mobile devices, Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on, IEEE, 2009, pp. 160–166.
[76]
M. Choraś, R. Kozik, Contactless palmprint and knuckle biometrics for mobile devices, Patt. Analy. Appl. 15 (1) (2012) 73–85.
[77]
Y. Shen, W. Hu, M. Yang, B. Wei, S. Lucey, C.T. Chou, Face recognition on smartphones via optimised sparse representation classification, Proceedings of the 13th international symposium on Information processing in sensor networks, IEEE Press, 2014, pp. 237–248.
[78]
A. Anjos, S. Marcel, Counter-measures to photo attacks in face recognition: a public database and a baseline, Biometrics (IJCB), 2011 international joint conference on, IEEE, 2011, pp. 1–7.
[79]
K. Choi, K.-A. Toh, H. Byun, Realtime training on mobile devices for face recognition applications, Patt. Recognit. 44 (2) (2011) 386–400.
[80]
S. Chen, A. Pande, P. Mohapatra, Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones, Proceedings of the 12th annual international conference on Mobile systems, applications, and services, ACM, 2014, pp. 109–122.
[81]
S. Barra, A. Casanova, F. Narducci, S. Ricciardi, Ubiquitous iris recognition by means of mobile devices, Patt. Recognit. Lett. 57 (2015) 66–73.
[82]
A.H. Akkermans, T.A. Kevenaar, D.W. Schobben, Acoustic ear recognition for person identification, Automatic Identification Advanced Technologies, 2005. Fourth IEEE Workshop on, IEEE, 2005, pp. 219–223.
[83]
T. Ojala, M. Pietikäinen, D. Harwood, A comparative study of texture measures with classification based on featured distributions, Patt. Recognit. 29 (1) (1996) 51–59.
[84]
J.M. Irvine, S.A. Israel, A sequential procedure for individual identity verification using ecg, EURASIP J. Adv. Signal Process. 2009 (1) (2009) 243215.
[85]
J.S. Arteaga-Falconi, H. Al Osman, A. El Saddik, Ecg authentication for mobile devices, IEEE Trans. Instrum. Meas. 65 (3) (2015) 591–600.
[86]
C. Bo, L. Zhang, X.-Y. Li, Q. Huang, Y. Wang, Silentsense: silent user identification via touch and movement behavioral biometrics, Proceedings of the 19th annual international conference on Mobile computing & networking, ACM, 2013, pp. 187–190.
[87]
M. Frank, R. Biedert, E. Ma, I. Martinovic, D. Song, Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication, IEEE Trans. Inform. Forensic. Secur. 8 (1) (2013) 136–148.
[88]
N. Sae-Bae, K. Ahmed, K. Isbister, N. Memon, Biometric-rich gestures: a novel approach to authentication on multi-touch devices, Proceedings of ACM SIGCHI, 2012.
[89]
M. Shahzad, A.X. Liu, A. Samuel, Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it, ACM MobiCom, 2013, pp. 39–50.
[90]
J. Liu, L. Zhong, J. Wickramasuriya, V. Vasudevan, User evaluation of lightweight user authentication with a single tri-axis accelerometer, Proceedings of MobileHCI, 2009.
[91]
G. Bailador, C. Sanchez-Avila, J. Guerra-Casanova, A. de Santos Sierra, Analysis of pattern recognition techniques for in-air signature biometrics, Patt. Recognit. (2011).
[92]
S. Kratz, M.T.I. Aumi, Airauth: a biometric authentication system using in-air hand gestures, CHI’14 Extended Abstracts on Human Factors in Computing Systems, ACM, 2014, pp. 499–502.
[93]
M. Shahzad, S. Zhang, Augmenting user identification with wifi based gesture recognition, Proceed. ACM Interact. Mobile Wearable Ubiquitous Technol. 2 (3) (2018) 134.
[94]
S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, A. Mohaisen, You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones, Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, IEEE, 2017, pp. 183–195.
[95]
L. Zhang, S. Tan, J. Yang, Y. Chen, Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 1080–1091.
[96]
L. Zhang, S. Tan, J. Yang, Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017, pp. 57–71.
[97]
K. Shiraga, N.T. Trung, I. Mitsugami, Y. Mukaigawa, Y. Yagi, Gait-based person authentication by wearable cameras, Networked Sensing Systems (INSS), 2012 Ninth International Conference on, IEEE, 2012, pp. 1–7.
[98]
Y. Ren, Y. Chen, M.C. Chuah, J. Yang, User verification leveraging gait recognition for smartphone enabled mobile healthcare systems, IEEE Trans. Mob. Comput. 14 (9) (2015) 1961–1974.
[99]
Y. Zeng, P.H. Pathak, P. Mohapatra, Wiwho: wifi-based person identification in smart spaces, Proceedings of the 15th International Conference on Information Processing in Sensor Networks, IEEE Press, 2016, p. 4.
[100]
W. Wang, A.X. Liu, M. Shahzad, Gait recognition using wifi signals, Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, 2016, pp. 363–373.
[101]
F. Hong, X. Wang, Y. Yang, Y. Zong, Y. Zhang, Z. Guo, Wfid: passive device-free human identification using wifi signal, Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, ACM, 2016, pp. 47–56.
[102]
C. Shi, J. Liu, H. Liu, Y. Chen, Smart user authentication through actuation of daily activities leveraging wifi-enabled iot, Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM, 2017, p. 5.
[103]
A.K. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuit. Syst. Video Technol. 14 (1) (2004) 4–20.
[104]
D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, 2009.
[105]
Kim KJ, Hur JH, Choi SH, inventors; Silicon Display Tech Co Ltd, assignee. Optical fingerprint sensor. United States patent US 9,864,893. 2018 Jan 9.
[106]
J.K. Schneider, Ultrasonic fingerprint sensors, Advances in Biometrics, Springer, 2008, pp. 63–74.
[107]
C.-C. Han, H.-L. Cheng, C.-L. Lin, K.-C. Fan, Personal authentication using palm-print features, Patt. Recognit. 36 (2) (2003) 371–381.
[108]
A. Ross, A. Jain, Information fusion in biometrics, Patt. Recognit. Lett. 24 (13) (2003) 2115–2125.
[109]
A. de Santos-Sierra, C. Sanchez-Avila, J. Guerra-Casanova, A. Mendaza-Ormaza, Hand biometrics in mobile devices, Advanced biometric technologies, InTech, 2011.
[110]
S. Barra, M. De Marsico, M. Nappi, F. Narducci, D. Riccio, A hand-based biometric system in visible light for mobile environments, Inform. Sci. (2018).
[111]
DeLong S. Facing The Future: The Fifth Amendment's Privilege Against Self-Incrimination & Your'Face ID'Passcode. Available at SSRN 3278386. 2018 Nov 5.
[112]
M.A. Turk, A.P. Pentland, Face recognition using eigenfaces, Computer Vision and Pattern Recognition, 1991. Proceedings CVPR’91., IEEE Computer Society Conference on, IEEE, 1991, pp. 586–591.
[113]
T. Ahonen, A. Hadid, M. Pietikainen, Face description with local binary patterns: application to face recognition, IEEE Trans. Patt. Analy. Mach. Intell. (12) (2006) 2037–2041.
[114]
J. Wright, A.Y. Yang, A. Ganesh, S.S. Sastry, Y. Ma, Robust face recognition via sparse representation, IEEE Trans. Patt. Analy. Mach. Intell. 31 (2) (2009) 210–227.
[115]
B. Duc, S. Fischer, J. Bigün, Face authentication with gabor information on deformable graphs, IEEE Trans. Image Process. 8 (4) (1999) 504–516.
[116]
K.-T. Cheng, Y.-C. Wang, Using mobile gpu for general-purpose computing–a case study of face recognition on smartphones, VLSI Design, Automation and Test (VLSI-DAT), 2011 International Symposium on, IEEE, 2011, pp. 1–4.
[117]
K. Kramer, D. Hedin, D. Rolkosky, Smartphone based face recognition tool for the blind, Engineering in Medicine and Biology Society (EMBC), 2010 Annual International Conference of the IEEE, IEEE, 2010, pp. 4538–4541.
[118]
M.E. Fathy, V.M. Patel, R. Chellappa, Face-based active authentication on mobile devices, Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on, IEEE, 2015, pp. 1687–1691.
[119]
G. Mai, K. Cao, P.C. Yuen, A.K. Jain, On the Reconstruction of Face Images from Deep Face Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 41 (5) (2018 Apr) 1188–1202.
[120]
P.J. Phillips, P.J. Flynn, T. Scruggs, K.W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, W. Worek, Overview of the face recognition grand challenge, Computer vision and pattern recognition, 2005. CVPR 2005. IEEE computer society conference on, 1, IEEE, 2005, pp. 947–954.
[121]
A. Boehm, D. Chen, M. Frank, L. Huang, C. Kuo, T. Lolic, I. Martinovic, D. Song, Safe: secure authentication with face and eyes, Privacy and Security in Mobile Systems (PRISMS), 2013 International Conference on, Citeseer, 2013, pp. 1–8.
[122]
S. Lim, K. Lee, O. Byeon, T. Kim, Efficient iris recognition through improvement of feature vector and classifier, ETRI J. 23 (2) (2001) 61–70.
[123]
J. Daugman, How iris recognition works, The essential guide to image processing, Elsevier, 2009, pp. 715–739.
[124]
J. Daugman, New methods in iris recognition, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37 (5) (2007) 1167–1175.
[125]
A. Kumar, A. Passi, Comparison and combination of iris matchers for reliable personal authentication, Patt. Recognit. 43 (3) (2010) 1016–1026.
[126]
P.A. Fahmi, E. Kodirov, D.-J. Choi, G.-S. Lee, A.M.F. Azli, S. Sayeed, Implicit authentication based on ear shape biometrics using smartphone camera during a call, Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, IEEE, 2012, pp. 2272–2276.
[127]
Q. Fang, F. Sufi, I. Cosic, A mobile device based ecg analysis system, Data Mining in Medical and Biological Research, InTech, 2008.
[128]
K. Brigham, B.V. Kumar, Subject identification from electroencephalogram (eeg) signals during imagined speech, Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), IEEE, 2010, pp. 1–8.
[129]
S.J. Kang, S.Y. Lee, H.I. Cho, H. Park, Ecg authentication system design based on signal analysis in mobile and wearable devices, IEEE Signal Process. Lett. 23 (6) (2016) 805–808.
[130]
J. Klonovs, C.K. Petersen, H. Olesen, A. Hammershoj, Id proof on the go: development of a mobile eeg-based biometric authentication system, IEEE Veh. Technol. Mag. 8 (1) (2013) 81–89.
[131]
S.B. Nikam, S. Agarwal, Ridgelet-based fake fingerprint detection, Neurocomputing 72 (10-12) (2009) 2491–2506.
[132]
T. Van der Putte, J. Keuning, Biometrical fingerprint recognition: dont get your fingers burned, Smart Card Research and Advanced Applications, Springer, 2000, pp. 289–303.
[133]
V. Kanhangad, S. Bhilare, P. Garg, P. Singh, N. Chaudhari, Anti-spoofing for display and print attacks on palmprint verification systems, Biometric and Surveillance Technology for Human and Activity Identification XII, 9457, International Society for Optics and Photonics, 2015, p. 94570E.
[134]
K. Kollreider, H. Fronthaler, J. Bigun, Non-intrusive liveness detection by face images, Image Vis. Comput. 27 (3) (2009) 233–244.
[135]
S. Bharadwaj, T.I. Dhamecha, M. Vatsa, R. Singh, Computationally efficient face spoofing detection with motion magnification, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2013, pp. 105–110.
[136]
H. Chen, H. Valizadegan, C. Jackson, S. Soltysiak, A.K. Jain, Fake hands: spoofing hand geometry systems, Biomet. Consort. (2005).
[137]
P. Gupta, S. Behera, M. Vatsa, R. Singh, On iris spoofing using print attack, Pattern recognition (ICPR), 2014 22nd international conference on, IEEE, 2014, pp. 1681–1686.
[138]
D. Menotti, G. Chiachia, A. Pinto, W.R. Schwartz, H. Pedrini, A.X. Falcao, A. Rocha, Deep representations for iris, face, and fingerprint spoofing detection, IEEE Trans. Inform. Forensic. Secur. 10 (4) (2015) 864–879.
[139]
N. Zheng, K. Bai, H. Huang, H. Wang, You are how you touch: User verification on smartphones via tapping behaviors., ICNP, 14, 2014, pp. 221–232.
[140]
N. Sae-Bae, K. Ahmed, K. Isbister, N. Memon, Biometric-rich gestures: A novel approach to authentication on multi-touch devices, Proceedings of ACM SIGCHI, 2012.
[141]
WeChat Chatterbox, Voiceprint: The New WeChat Password, WeChat Blog (2015) https://blog.wechat.com/2015/05/21/voiceprint-the-new-wechat-password/.
[143]
D.A. Reynolds, R.C. Rose, Robust text-independent speaker identification using gaussian mixture speaker models, IEEE Trans. Speech Audio Process. 3 (1) (1995) 72–83.
[144]
H. Gish, K. Karnofsky, M. Krasner, S. Roucos, R. Schwartz, J. Wolf, Investigation of text-independent speaker indentification over telephone channels, Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP’85., 10, IEEE, 1985, pp. 379–382.
[145]
E. Variani, X. Lei, E. McDermott, I.L. Moreno, J. Gonzalez-Dominguez, Deep neural networks for small footprint text-dependent speaker verification, Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on, IEEE, 2014, pp. 4052–4056.
[146]
J.P. Campbell, Speaker recognition: a tutorial, Proceed. IEEE 85 (9) (1997) 1437–1462.
[147]
Y. Ren, Y. Chen, M.C. Chuah, J. Yang, User verification leveraging gait recognition for smartphone enabled mobile healthcare systems, IEEE Trans. Mob. Comput. (2014).
[148]
D. Shen, I. Markwood, D. Shen, Y. Liu, Virtual safe: Unauthorized movement detection for mobile devices, Communications and Network Security (CNS), 2016 IEEE Conference on, IEEE, 2016, pp. 315–323.
[149]
W.-H. Lee, R.B. Lee, Multi-sensor authentication to improve smartphone security, Information Systems Security and Privacy (ICISSP), 2015 International Conference on, IEEE, 2015, pp. 1–11.
[150]
J. Lindberg, M. Blomberg, Vulnerability in speaker verification-a study of technical impostor techniques, Sixth European Conference on Speech Communication and Technology, 1999.
[151]
R. Togneri, D. Pullella, An overview of speaker identification: accuracy and robustness issues, IEEE Circuit. Syst. Mag. 11 (2) (2011) 23–61.
[152]
P.L. De Leon, M. Pucher, J. Yamagishi, Evaluation of the vulnerability of speaker verification to synthetic speech, IEEE Trans. Audio Speech Lang. Process. 20 (2012) 2280–2290.
[153]
N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields, D. Wagner, W. Zhou, Hidden voice commands, 25th {USENIX} Security Symposium ({USENIX} Security 16), 2016, pp. 513–530.
[154]
N. Carlini, D. Wagner, Adversarial examples are not easily detected: bypassing ten detection methods, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, ACM, 2017, pp. 3–14.
[155]
X. Yuan, Y. Chen, Y. Zhao, Y. Long, X. Liu, K. Chen, S. Zhang, H. Huang, X. Wang, C.A. Gunter, Commandersong: A systematic approach for practical adversarial voice recognition, 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018, pp. 49–64.
[156]
G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, W. Xu, Dolphinattack: Inaudible voice commands, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017, pp. 103–117.
[157]
A. Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, Y. Koucheryavy, Multi-factor authentication: a survey, Cryptography 2 (1) (2018) 1.
[158]
D.-J. Kim, K.-W. Chung, K.-S. Hong, Person authentication using face, teeth and voice modalities for mobile device security, IEEE Trans Consum. Electron. 56 (4) (2010).
[159]
K.B. Raja, R. Raghavendra, M. Stokkenes, C. Busch, Multi-modal authentication system for smartphones using face, iris and periocular, Biometrics (ICB), 2015 International Conference on, IEEE, 2015, pp. 143–150.
[160]
M. De Marsico, C. Galdi, M. Nappi, D. Riccio, Firme: Face and iris recognition for mobile engagement, Image Vis. Comput. 32 (12) (2014) 1161–1172.
[161]
C. McCool, S. Marcel, A. Hadid, M. Pietikäinen, P. Matejka, J. Cernockỳ, N. Poh, J. Kittler, A. Larcher, C. Levy, et al., Bi-modal person recognition on a mobile phone: using mobile phone data, Multimedia and Expo Workshops (ICMEW), 2012 IEEE International Conference on, IEEE, 2012, pp. 635–640.
[162]
K. Ohkubo, inventor, Sanyo Electric Co Ltd, Assignee. ID Check Device, ID Generation Device, and Authentication System. United States Patent Application US 10/924,578 3 (2005 Mar).
[163]
M. Stricklen, T. McHale, M. Caminetsky, V. Reddy, inventors, CA Inc, assignee. Mobile device management, United States Patent US 2 (8,903,365. 2014 Dec).
[164]
M.H. Eldefrawy, M.K. Khan, K. Alghathbar, T.-H. Kim, H. Elkamchouchi, Mobile one-time passwords: two-factor authentication using mobile phones, Secur. Commun. Netw. 5 (5) (2012) 508–516.
[165]
S. Dey, N. Roy, W. Xu, R.R. Choudhury, S. Nelakuditi, Accelprint: Imperfections of accelerometers make smartphones trackable, Proceedings of the Network and Distributed System Security Symposium (USENIX NDSS), 2014.
[166]
Bojinov, Hristo, Yan Michalevsky, Gabi Nakibly, and Dan Boneh. "Mobile device identification via sensor fingerprinting." arXiv preprint arXiv:1408.1416 (2014).
[167]
X. Fang, J. Zhan, Online banking authentication using mobile phones, Future Information Technology (FutureTech), 2010 5th International Conference on, IEEE, 2010, pp. 1–5.
[168]
R.E. Reeves, R.A. Wick, J.H. Bryan, J.M. Jones III, Inventors; Sprint Communications Co LP, Assignee. Managing Certificates on a Mobile Device. United States Patent US 8,949,597 3 (2015 Feb).
[169]
S. Yi, Z. Qin, N. Carter, Q. Li, Wearlock: unlocking your phone via acoustics using smartwatch, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, 2017, pp. 469–479.
[170]
A.P. Sabzevar, A. Stavrou, Universal multi-factor authentication using graphical passwords, Signal Image Technology and Internet Based Systems, 2008. SITIS’08. IEEE International Conference on, IEEE, 2008, pp. 625–632.
[171]
F. Aloul, S. Zahidi, W. El-Hajj, Two factor authentication using mobile phones, Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, IEEE, 2009, pp. 641–644.
[172]
N. Karapanos, C. Marforio, C. Soriente, S. Capkun, Sound-proof: usable two-factor authentication based on ambient sound, USENIX Security Symposium, 2015, pp. 483–498.
[173]
B.-R. Cha, S.-H. Lee, S.-B. Park, G.-K.L.Y.-K. Ji, et al., Design of micro-payment to strengthen security by 2 factor authentication with mobile & wearable devices, Adv. Sci. Technol. Lett. 109 (7) (2015) 28–32.
[174]
A. Bianchi, I. Oakley, Wearable authentication: trends and opportunities, It-Inform. Technol. 58 (5) (2016) 255–262.
[175]
M. Azimpourkivi, U. Topkara, B. Carbunar, Camera based two factor authentication through mobile and wearable devices, Proceed. ACM Interact. Mobile Wearable Ubiquitous Technol. 1 (3) (2017) 35.
[176]
L. Blue, H. Abdullah, L. Vargas, P. Traynor, 2ma: verifying voice commands via two microphone authentication, Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ACM, 2018, pp. 89–100.
[177]
H. Feng, K. Fawaz, K.G. Shin, Continuous authentication for voice assistants, Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, ACM, 2017, pp. 343–355.
[178]
C. Giuffrida, K. Majdanik, M. Conti, H. Bos, I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2014, pp. 92–111.
[179]
A. De Luca, A. Hang, F. Brudy, C. Lindner, H. Hussmann, Touch me once and i know it’s you!: implicit authentication based on touch screen patterns, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2012, pp. 987–996.
[180]
Y. Ren, C. Wang, Y. Chen, M.C. Chuah, J. Yang, Critical segment based real-time e-signature for securing mobile transactions, Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, 2015, pp. 7–15.
[181]
J. Liu, C. Wang, Y. Chen, N. Saxena, Vibwrite: Towards finger-input authentication on ubiquitous surfaces via physical vibration, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2017, pp. 73–87.
[182]
Diewland, Mac address ghost, Android APKPure (2015) https://apkpure.com/mac-address-ghost/diewland.changemac.
[183]
Y. Sheng, K. Tan, G. Chen, D. Kotz, A. Campbell, Detecting 802.11 mac layer spoofing using received signal strength, INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, IEEE, 2008, pp. 1768–1776.
[184]
B. Shrestha, M. Shirvanian, P. Shrestha, N. Saxena, The sounds of the phones: dangers of zero-effort second factor login based on ambient audio, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2016, pp. 908–919.

Cited By

View all

Index Terms

  1. User authentication on mobile devices: Approaches, threats and trends
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Computer Networks: The International Journal of Computer and Telecommunications Networking
        Computer Networks: The International Journal of Computer and Telecommunications Networking  Volume 170, Issue C
        Apr 2020
        246 pages

        Publisher

        Elsevier North-Holland, Inc.

        United States

        Publication History

        Published: 07 April 2020

        Author Tags

        1. User authentication
        2. Mobile device
        3. Embedded sensor
        4. Authentication attack

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 03 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)DAP PLXENT#x1D107; : Develop pair-Authentication Protocol with DAPAdjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction10.1145/3640471.3680449(1-6)Online publication date: 21-Sep-2024
        • (2024)MotionIDPervasive and Mobile Computing10.1016/j.pmcj.2024.101922101:COnline publication date: 1-Jul-2024
        • (2024)Robust biometric scheme against replay attacks using one-time biometric templatesComputers and Security10.1016/j.cose.2023.103586137:COnline publication date: 1-Feb-2024
        • (2024)Deep learning-based photoplethysmography biometric authentication for continuous user verificationApplied Soft Computing10.1016/j.asoc.2024.111461156:COnline publication date: 9-Jul-2024
        • (2024)A meta-pattern for building QoS-optimal mobile services out of equivalent microservicesService Oriented Computing and Applications10.1007/s11761-024-00391-118:2(109-120)Online publication date: 1-Jun-2024
        • (2023)A Survey of PPG's Application in AuthenticationComputers and Security10.1016/j.cose.2023.103488135:COnline publication date: 1-Dec-2023
        • (2023)On the Impact of FFP2 Face Masks on Speaker Verification for Mobile Device AuthenticationAdvances in Mobile Computing and Multimedia Intelligence10.1007/978-3-031-48348-6_3(35-49)Online publication date: 4-Dec-2023
        • (2022)Your tapstroke tells who you areProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538783(559-560)Online publication date: 27-Jun-2022
        • (2021)Robust multimodal biometric authentication algorithms using fingerprint, iris and voice features fusionJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-20042540:1(647-672)Online publication date: 1-Jan-2021
        • (2021)An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor NetworksSecurity and Communication Networks10.1155/2021/20371882021Online publication date: 1-Jan-2021
        • Show More Cited By

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media