A Methodology for Silent and Continuous Authentication in Mobile Environment

3Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since the pervasiveness of mobile technologies has been increasing, sensitive user information is often stored on mobile devices. Currently, mobile devices do not verify the identity of the user after the login. This enables attackers full access to sensitive data and applications on the device, if they obtain the password or grab the device after login. In order to mitigate this risk, we propose a continuous and silent monitoring process based on a set of features: orientation, touch and cell tower. The assumption is that the features are representative of smartphone owner interaction with the device and this is the reason why the features can be useful to distinguish the owner from an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.

Cite

CITATION STYLE

APA

Canfora, G., di Notte, P., Mercaldo, F., & Visaggio, C. A. (2017). A Methodology for Silent and Continuous Authentication in Mobile Environment. In Communications in Computer and Information Science (Vol. 764, pp. 241–265). Springer Verlag. https://doi.org/10.1007/978-3-319-67876-4_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free