Implicit user re-authentication for mobile devices

21Citations
Citations of this article
71Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are therefore susceptible to theft and unauthorized access. We propose an implicit user re-authentication system for portable computers that requires no application changes or hardware modifications. The proposed technique observes user-specific patterns in filesystem activity and network access to build models of normal behavior. These are used to distinguish between normal use and anomalous use. We describe these automated model generation and user detection techniques, and explain how to efficiently implement them in a wireless distributed system composed of servers and battery-powered portable devices. The proposed system is able to distinguish between normal use and attack with an accuracy of approximately 90% every 5 minutes and consumes less than 12% of a typical laptop battery in 24 hours. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Yazji, S., Chen, X., Dick, R. P., & Scheuermann, P. (2009). Implicit user re-authentication for mobile devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5585 LNCS, pp. 325–339). https://doi.org/10.1007/978-3-642-02830-4_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free