Title :
A method for improving mobile authentication using human spatio-temporal behavior
Author :
Albayram, Yusuf ; Kentros, Sotirios ; Ruhua Jiang ; Bamis, Athanasios
Author_Institution :
Comput. Sci. & Eng. Dept., Univ. of Connecticut, Storrs, CT, USA
Abstract :
Integration of NFC radios into smartphones is expediting the adoption of mobile devices as the preferred method for accessing physical locations, bank accounts, and other valuable resources. The pervasive nature of authentication using these mobile devices, however, comes with increased security considerations stemming from the possibility of physical loss of the device. To minimize the risk caused by stolen devices, this paper introduces a method for confirming the identity of a device´s user based on her recent macroscopic behavior over space and time. The user´s behavior is continuously recorded by a set of devices embedded in the environment (e.g., Wi-Fi Access Point) and used to train a probabilistic n-gram model. Subsequently, deviations caused by stolen devices can be detected by comparing the user´s recent behavior against the trained model. Our first evaluation results demonstrate the ability of the proposed approach to detect anomalies in the user´s behavior without generating a significant number of false alarms.
Keywords :
authorisation; near-field communication; smart phones; telecommunication security; NFC radio; human spatiotemporal behavior; mobile authentication improvement; mobile devices; near field communication; probabilistic n-gram model; smartphones; user macroscopic behavior; Authentication; Computational modeling; Hidden Markov models; History; IEEE 802.11 Standards; Smart phones; Activity Recognition; Authentication; Experiential Authentication; Mobile Devices; Security;
Conference_Titel :
Computers and Communications (ISCC), 2013 IEEE Symposium on
Conference_Location :
Split
DOI :
10.1109/ISCC.2013.6754964