Advertisement

Rhythm-Based Authentication Scheme on Smart Devices

  • Jae Dong Lee
  • Won Min Kang
  • Chang Hyun Moon
  • Hwa-Young Jeong
  • Young-Sik Jeong
  • Jai-Jin Jung
  • Jong Hyuk Park
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 301)

Abstract

Due to computing power and advances of smart devices, recently uses of smart-phone have been rapidly increasing. Smart devices (smartphones and tablet PC etc.) threats such as a personal information leakage and fraudulent use of smart devices have also increased. So, effective measures are needed to address security issues of smart devices—authentication, access control, prevention from the attackers. In this paper, we proposed a rhythm-based user authentication scheme on smart devices. The proposed scheme complements the vulnerabilities of the existing schemes, and provides authentication that ensures availability. In additional, it provides stronger security and greater convenience.

Keywords

User authentication Rhythm Smart devices Tablet PC Android phone 

Notes

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the CPRC (Communications Policy Research Center) support program supervised by the KCA (Korea Communications Agency) (KCA-2013-003).

References

  1. 1.
    Jaegal B (2010) Trend of smartphone market and mobile OS. Samsung Wireless Division, 6.DGoogle Scholar
  2. 2.
    Lee A, Bok D (2008) Interface technology for improving production value. Samsung Economics Research Institute (SERI) Economic Focus, No. 216, Oct 2008Google Scholar
  3. 3.
    Mohammed MM, Elsadig M (2013) A multi-layer of multi factors authentication model for online banking services. In: ICCEEE 2013, IEEE, pp 220–224, Aug 2013Google Scholar
  4. 4.
    Android Security Overview, Android open source project, http://source.android.com/devices/tech/security/
  5. 5.
    Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: 4th USENIX workshop on offensive technologies, Aug 2010Google Scholar
  6. 6.
    Lashkari AH, Farmand S, Zakaria OB, Saleh R (2009) Shoulder surfing attack in graphical password authentication. Int J Comput Sci Inf Secur 6(2):145–154Google Scholar
  7. 7.
    Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. Secur Privacy IEEE 2(5):25–31CrossRefGoogle Scholar
  8. 8.
    Wiedenbeck S, Waters J, Birget JC, Brodskiy A, Memon N (2005) PassPoints: design and longitudinal evaluation of a graphical password system. Int J Human-Comput Stud 63(1–2):102–127CrossRefGoogle Scholar
  9. 9.
    Kang P, Park S, Hwang S, Lee H, Cho S (2008) Improvement of keystroke data quality through artificial rhythms and cues. Comput Secur 27(1–2):3–11CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Jae Dong Lee
    • 1
  • Won Min Kang
    • 1
  • Chang Hyun Moon
    • 1
  • Hwa-Young Jeong
    • 2
  • Young-Sik Jeong
    • 3
  • Jai-Jin Jung
    • 4
  • Jong Hyuk Park
    • 1
  1. 1.Seoul National University of Science and TechnologyNowon-gu, SeoulSouth Korea
  2. 2.Humanitas College, Kyung Hee UniversityDongdaemun-gu, SeoulSouth Korea
  3. 3.Department of Multimedia EngineeringDongguk UniversityJung-gu, SeoulSouth Korea
  4. 4.Department of Multimedia EngineeringDankook UniversitySuji-gu, Yongin-siSouth Korea

Personalised recommendations