Skip to main content

Active User Authentication for Mobile Devices

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7405))

Abstract

Enterprises today are dealing with the challenges involved in enabling secure and remote access for mobile device users. People often bring their personal mobile devices into works and use them to access corporate resources, and also store their private information on personal mobile devices. This has prompted investigation of new security policies and techniques. Authentication is the first gate for protecting access to personal mobile devices or access remote resources through personal mobile devices. Conventional authentication does not require user re-authentication for continuous usage of the devices. And attackers can target at a post-authentication session. In this paper, we study the active authentication for personal mobile devices and propose a biometrics based active authentication system. The proposed system is secure, effective and user-friendly. Our experimental results also show the feasibility of the proposed system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://iris.nist/gov/ice/

  2. Ahmed, A.A.E., Traore, I.: Dynamic sample size detection in continuous authentication using sequential sampling. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 169–176. ACM, New York (2011)

    Google Scholar 

  3. Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making 7(3), 243–256 (2008)

    Article  MathSciNet  Google Scholar 

  4. Brosso, I., La Neve, A., Bressan, G., Ruggiero, W.V.: A continuous authentication system based on user behavior analysis. In: International Conference on Availability, Reliability and Security, pp. 380–385 (2010)

    Google Scholar 

  5. Daugman, J.: How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14(1), 21–30 (2004)

    Article  Google Scholar 

  6. Libor, M.: Recognition of human iris patterns for biometric identification. Technical report, University of Western Australia (2003)

    Google Scholar 

  7. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  8. Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 7667 (April 2010)

    Google Scholar 

  9. Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Transactions on Information Forensics and Security 5(4), 771–780 (2010)

    Article  Google Scholar 

  10. Proença, H., Alexandre, L.A.: UBIRIS: A Noisy Iris Image Database. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 970–977. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Dimensional Research Report. The impact of mobile devices on information security: a survey of it professionals. Technical report (2012)

    Google Scholar 

  12. Sieger, H., Kirschnick, N., Moller, S.: User preferences for biometric authentication methods and graded security on mobile phones. In: Symposium on Usability, Privacy and Security, SOUPS (2010)

    Google Scholar 

  13. Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 687–700 (2007)

    Article  Google Scholar 

  14. Sui, Y., Zou, X., Du., E.: Biometrics-based authentication: A new approach. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (August 2011)

    Google Scholar 

  15. Sui, Y., Zou, X., Du, Y., Li, F.: Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers (submitted, 2012)

    Google Scholar 

  16. Xiao, Q., Yang, X.D.: A facial presence monitoring system for information security. In: IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, CIB 2009, March 30-April 2, pp. 69–76 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sui, Y., Zou, X., Li, F., Du, E.Y. (2012). Active User Authentication for Mobile Devices. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31869-6_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31868-9

  • Online ISBN: 978-3-642-31869-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics