Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3241539.3241574acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication

Published: 15 October 2018 Publication History

Abstract

Mobile two-factor authentication (2FA) has become commonplace along with the popularity of mobile devices. Current mobile 2FA solutions all require some form of user effort which may seriously affect the experience of mobile users, especially senior citizens or those with disability such as visually impaired users. In this paper, we propose Proximity-Proof, a secure and usable mobile 2FA system without involving user interactions. Proximity-Proof automatically transmits a user's 2FA response via inaudible OFDM-modulated acoustic signals to the login browser. We propose a novel technique to extract individual speaker and microphone fingerprints of a mobile device to defend against the powerful man-in-the-middle (MiM) attack. In addition, Proximity-Proof explores two-way acoustic ranging to thwart the co-located attack. To the best of our knowledge, Proximity-Proof is the first mobile 2FA scheme resilient to the MiM and co-located attacks. We empirically analyze that Proximity-Proof is at least as secure as existing mobile 2FA solutions while being highly usable. We also prototype Proximity-Proof and confirm its high security, usability, and efficiency through comprehensive user experiments.

References

[1]
https://goo.gl/PRkb95
[2]
https://www.w3schools.com/html/html5_audio.asp
[3]
https://www.authy.com.
[4]
https://www.duosecurity.com/product/methods/duo-mobile
[5]
https://www.encapsecurity.com/
[6]
https://goo.gl/YfmhDF
[7]
https://www.google.com/landing/2step/
[8]
https://goo.gl/gXWqjp
[9]
https://www.yubico.com/
[10]
D. Chen, X. Mao, Z. Qin, W. Wang, X.-Y. Li, and Z. Qin. 2015. WirelessDevice Authentication Using Acoustic Hardware Fingerprints. BigCom. Taiyuan, China. (August 2015).
[11]
D. Chen, N. Zhang, Z. Qin, X. Mao, Z. Qin, X. Shen, and X. Li. 2017.S2M: A Lightweight Acoustic Fingerprints-based Wireless Device AuthenticationProtocol. IEEE Internet of Things Journal 4,1 (2017), 88--100.%%
[12]
A. Czeski, M. Dietz, T. Kohno, D. Wallach, and D. Balfanz. 2012.Strengthening User Authentication through Opportunistic CryptographicIdentity Assertions. ACM CCS. Raleigh, NC. (October 2012).
[13]
A. Das, N. Borisov, and M. Caesar. 2014. Do You Hear What I Hear?: FingerprintingSmart Devices Through Embedded Acoustic Components.ACM CCS. Scottsdale, AZ. (November 2014).
[14]
T. Derham, S. Doughty, K.Woodbridge, and C. Baker. 2007. Design andEvaluation of a Low-Cost Multistatic Netted Radar System. IET Radar,Sonar & Navigation 1,5 (October 2007), 362--368 .
[15]
https://goo.gl/RBGkX3
[16]
https://goo.gl/Vy32JP%
[17]
N. Gunson, D. Marshall, H. Morton, and M. Jack. 2011. User Perceptionsof Security and Usability of Single-Factor and Two-Factor Authenticationin Automated Telephone Banking. Computers & Security 30, 4 (June2011), 208--220.
[18]
N. Karapanos, C. Marforio, C. Soriente, and S. Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound.USENIX Security. Washington, DC. (November 2014).
[19]
K. Kulpa. 2006. Continuous Wave Radars-Monostatic, Multistatic andNetwork. Advances in Sensing with Security Applications (2006), 215-242.
[20]
T. Li, Y. Chen, J. Sun, X. Jin, and Y. Zhang. 2016. Ilock: Immediate andAutomatic Locking of Mobile Devices Against Data Theft. ACM CCS. Vienna, Austria. (October 2016).
[21]
D. Mackay. 2003. Information Theory, Inference and Learning Algorithms. Cambridge university press.
[22]
W. Mao, J. He, and L. Qiu. 2016. CAT: High-Precision Acoustic MotionTracking. ACM MobiCom. New York, NY, USA. (October 2016).
[23]
R. Nandakumar, V. Iyer, D. Tan, and S. Gollakota. 2016. FingerIO: UsingActive Sonar for Fine-Grained Finger Tracking. ACM CHI. San Jose,CA. (May 2016).
[24]
R. Peeters, J. Hermans, P. Maene, K. Grenman, K. Halunen, and J.Haikio. 2017. n-Auth: Mobile Authentication Done Right. ACSAC. Orlando, FL. (December 2017).
[25]
C. Peng, G. Shen, Y. Zhang, Y. Li, and K. Tan. 2007. BeepBeep: A HighAccuracy Acoustic Ranging System using COTS Mobile Devices. ACM Sensys. Sydney, Australia. (November 2007).
[26]
A. Rosati. 2017. Two Factor Authentication Using Near Field Communications.(March 2017). US Patent 9594896.
[27]
M. Shirvanian, S. Jarecki, N. Saxena, and N. Nathan. 2014. Two-FactorAuthentication Resilient to Server Compromise Using Mix-BandwidthDevices. NDSS. San Diego, CA. (February 2014).
[28]
B. Shrestha, M. Shirvanian, P. Shrestha, and N. Saxena. 2016. TheSounds of the Phones: Dangers of Zero-Effort Second Factor Loginbased on Ambient Audio. ACM CCS. Vienna, Austria. (October2016).
[29]
T. Szabo. 1994. Time Domain Wave Equations for Lossy Media Obeying aFrequency Power Law. The Journal of the Acoustical Society of America96,1 (1994), 492--500.
[30]
Q. Wang, K. Ren, M. Zhou, T. Lei, D. Koutsonikolas, and L. Su. 2016.Messages Behind the Sound: Real-Time Hidden Acoustic Signal Capturewith Smartphones. ACM MobiCom. New York City, NY. (October2016).
[31]
W. Wang and H. Shao. 2013. Performance Prediction of a SynchronizationLink for Distributed Aerospace Wireless Systems. The ScientificWorld Journal (July 2013).
[32]
T. Wei and X. Zhang. 2015. Mtrack: High-Precision Passive TrackingUsing Millimeter Wave Radios. ACM MobiCom. Paris, France.(September 2015).
[33]
C. Weir, G. Douglas, T. Richardson, and M. Jack. 2009. Usable security:User preferences for authentication methods in eBanking and theeffects of experience. Interacting with Computers 22,3 (October 2009),153--164.
[34]
Z. Zhou, W. Diao, X. Liu, and K. Zhang. 2014. Acoustic FingerprintingRevisited: Generate Stable Device ID Stealthy with Inaudible Sound. ACM CCS. Scottsdale, AZ. (November 2014).

Cited By

View all
  • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
  • (2025)Biometric Encoding for Replay-Resistant Smartphone User Authentication Using HandgripsIEEE Transactions on Mobile Computing10.1109/TMC.2024.347467324:2(1230-1248)Online publication date: Feb-2025
  • (2024)UWB-Auth: A UWB-based Two Factor Authentication PlatformProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656113(185-195)Online publication date: 27-May-2024
  • Show More Cited By

Index Terms

  1. Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking
    October 2018
    884 pages
    ISBN:9781450359030
    DOI:10.1145/3241539
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. mobile security
    2. speaker and microphone fingerprinting
    3. two-factor authentication
    4. usability

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    MobiCom '18
    Sponsor:

    Acceptance Rates

    MobiCom '18 Paper Acceptance Rate 42 of 187 submissions, 22%;
    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)265
    • Downloads (Last 6 weeks)27
    Reflects downloads up to 01 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
    • (2025)Biometric Encoding for Replay-Resistant Smartphone User Authentication Using HandgripsIEEE Transactions on Mobile Computing10.1109/TMC.2024.347467324:2(1230-1248)Online publication date: Feb-2025
    • (2024)UWB-Auth: A UWB-based Two Factor Authentication PlatformProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656113(185-195)Online publication date: 27-May-2024
    • (2024)Sound-based Two-factor Authentication: Vulnerabilities and RedesignACM Transactions on Privacy and Security10.1145/363217527:1(1-27)Online publication date: 10-Jan-2024
    • (2024)Robust Mobile Two-Factor Authentication Leveraging Acoustic FingerprintingIEEE Transactions on Mobile Computing10.1109/TMC.2024.339118423:12(11105-11120)Online publication date: Dec-2024
    • (2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
    • (2024)ZITA: Zero-Interaction Two-Factor Authentication using Contact Traces and In-band Proximity VerificationIEEE Transactions on Mobile Computing10.1109/TMC.2023.3321514(1-16)Online publication date: 2024
    • (2024)ADEAS: Authentication Using Doppler Effect of Acoustic Signals Caused by Hands MovingIEEE Internet of Things Journal10.1109/JIOT.2024.345069211:24(40009-40025)Online publication date: 15-Dec-2024
    • (2024)Exclusively in-store: Acoustic location authentication for stationary business devicesJournal of Network and Computer Applications10.1016/j.jnca.2024.104028(104028)Online publication date: Sep-2024
    • (2024)SPAWN: Seamless Proximity-Based Authentication by Utilizing the Existent WiFi EnvironmentInformation Security Theory and Practice10.1007/978-3-031-60391-4_1(1-16)Online publication date: 18-Jun-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    EPUB

    View this article in ePub.

    ePub

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media