Abstract
Enterprises today are dealing with the challenges involved in enabling secure and remote access for mobile device users. People often bring their personal mobile devices into works and use them to access corporate resources, and also store their private information on personal mobile devices. This has prompted investigation of new security policies and techniques. Authentication is the first gate for protecting access to personal mobile devices or access remote resources through personal mobile devices. Conventional authentication does not require user re-authentication for continuous usage of the devices. And attackers can target at a post-authentication session. In this paper, we study the active authentication for personal mobile devices and propose a biometrics based active authentication system. The proposed system is secure, effective and user-friendly. Our experimental results also show the feasibility of the proposed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahmed, A.A.E., Traore, I.: Dynamic sample size detection in continuous authentication using sequential sampling. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 169–176. ACM, New York (2011)
Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making 7(3), 243–256 (2008)
Brosso, I., La Neve, A., Bressan, G., Ruggiero, W.V.: A continuous authentication system based on user behavior analysis. In: International Conference on Availability, Reliability and Security, pp. 380–385 (2010)
Daugman, J.: How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology 14(1), 21–30 (2004)
Libor, M.: Recognition of human iris patterns for biometric identification. Technical report, University of Western Australia (2003)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)
Niinuma, K., Jain, A.K.: Continuous user authentication using temporal information. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 7667 (April 2010)
Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Transactions on Information Forensics and Security 5(4), 771–780 (2010)
Proença, H., Alexandre, L.A.: UBIRIS: A Noisy Iris Image Database. In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 970–977. Springer, Heidelberg (2005)
Dimensional Research Report. The impact of mobile devices on information security: a survey of it professionals. Technical report (2012)
Sieger, H., Kirschnick, N., Moller, S.: User preferences for biometric authentication methods and graded security on mobile phones. In: Symposium on Usability, Privacy and Security, SOUPS (2010)
Sim, T., Zhang, S., Janakiraman, R., Kumar, S.: Continuous verification using multimodal biometrics. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 687–700 (2007)
Sui, Y., Zou, X., Du., E.: Biometrics-based authentication: A new approach. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (August 2011)
Sui, Y., Zou, X., Du, Y., Li, F.: Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers (submitted, 2012)
Xiao, Q., Yang, X.D.: A facial presence monitoring system for information security. In: IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, CIB 2009, March 30-April 2, pp. 69–76 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sui, Y., Zou, X., Li, F., Du, E.Y. (2012). Active User Authentication for Mobile Devices. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-31869-6_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31868-9
Online ISBN: 978-3-642-31869-6
eBook Packages: Computer ScienceComputer Science (R0)