Document Type
Conference Proceeding
Language
eng
Format of Original
9 p.
Publication Date
6-2014
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Source Publication
2014 IEEE Eighth International Conference on Software Security and Reliability-Companion (SERE-C)
Original Item ID
doi: 10.1109/SERE-C.2014.30
Abstract
Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for authentication. This system silently does authentication using location traces and gait pattern of its user. If the silent authentication fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based authentication technique can be useful for numerous real life scenarios where mobile device security is important.
Recommended Citation
Rahman, Farzana; Gani, Md O.; Ahsan, Golam Mushih Tanimul; and Ahamed, Sheikh Iqbal, "Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices" (2014). Mathematics, Statistics and Computer Science Faculty Research and Publications. 241.
https://epublications.marquette.edu/mscs_fac/241
Comments
Accepted version. Published as part of the proceedings of the conference, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion (SERE-C), 2014: 121-129. DOI. © 2014 Institute of Electrical and Electronics Engineers (IEEE). Used with permission.