skip to main content
10.1145/3089351.3089357acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article
Public Access

AuthoRing: Wearable User-presence Authentication

Published: 19 June 2017 Publication History

Abstract

A common log-in process at computers involves the entry of username and password; log out depends on the user to remember to log out, or a timeout to expire the user session. Once logged in, user sessions may be vulnerable to imposter attacks in which an impostor steps up to the user's unattended computer and inherits the user's access privilege. We propose a ring-based authentication system called "AuthoRing", which restricts the imposter attackers from generating new inputs at the computer's mouse and keyboard. During the log-in process, an eligible AuthoRing user wears a digital ring with accelerometers and wireless communication capability. When input is detected at the mouse or keyboard, the computer's AuthoRing system correlates hand-motion data received from the ring with the input data from the computer's window manager, and detects imposter attacks when these data are insufficiently correlated. We implemented the AuthoRing system and evaluated its security, efficiency, and usability; we found that imposter attacks can be effectively detected and the required operations happen quickly with negligible delays experienced by the user.

References

[1]
Human Bench Mark. http://www.humanbenchmark.com/tests/reactiontime.
[2]
Tinyduino. https://tiny-circuits.com/.
[3]
Banerjee, S. P., and Woodard, D. L. Biometric authentication and identification using keystroke dynamics: A survey. Journal of Pattern Recognition Research 7, 1 (2012), 116--139.
[4]
Chen, B., Yenamandra, V., and Srinivasan, K. Tracking keystrokes using wireless signals. In MobiSys (2015), pp. 31--44.
[5]
Chong, M. K., Marsden, G., and Gellersen, H. GesturePIN: using discrete gestures for associating mobile devices. In Proceedings of the International Conference on Human Computer Interaction with Mobile Devices and Services (Mobile HCI) (2010), pp. 261--264.
[6]
Cornelius, C., Peterson, R., Skinner, J., Halter, R., and Kotz, D. A wearable system that knows who wears it. In MobiSys (2014), pp. 55--67.
[7]
Corner, M. D., and Noble, B. D. Protecting applications with transient authentication. In MobiSys (2003), pp. 57--70.
[8]
Eberz, S., Rasmussen, K. B., Lenders, V., and Martinovic, I. Preventing lunchtime attacks: Fighting insider threats with eye movement biometrics. In NDSS (2015).
[9]
Gummeson, J., Priyantha, B., and Liu, J. An energy harvesting wearable ring platform for gesture input on surfaces. In MobiSys (2014), pp. 162--175.
[10]
Hermans, J., and Peeters, R. Realizing Pico: Finally no more passwords! IACR Cryptology ePrint Archive (2014), 519.
[11]
Landwehr, C. E. Protecting unattended computers without software. In ACSAC (1997), pp. 274--283.
[12]
Mare, S., Molina-Markham, A., Cornelius, C., Peterson, R., and Kotz, D. ZEBRA: Zero-effort bilateral recurring authentication. In IEEE S&P (2014), pp. 705--720.
[13]
Nakkabi, Y., Traoré, I., and Ahmed, A. A. E. Improving mouse dynamics biometric performance using variance reduction via extractors with separate features. IEEE Transactions on Systems, Man, and Cybernetics, Part A 40, 6 (2010), 1345--1353.
[14]
Nirjon, S., Gummeson, J., Gelb, D., and Kim, K.-H. TypingRing: A wearable ring platform for text input. In MobiSys (2015), pp. 227--239.
[15]
Shen, C., Cai, Z., Guan, X., Du, Y., and Maxion, R. User authentication through mouse dynamics. IEEE Transactions on Information Forensics and Security 8, 1 (Jan 2013), 16--30.
[16]
Shukla, D., Kumar, R., Serwadda, A., and Phoha, V. V. Beware, your hands reveal your secrets! In ACM CCS (2014), pp. 904--917.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WearSys '17: Proceedings of the 2017 Workshop on Wearable Systems and Applications
June 2017
60 pages
ISBN:9781450349598
DOI:10.1145/3089351
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. sensors
  3. wearable devices

Qualifiers

  • Research-article

Funding Sources

Conference

MobiSys'17
Sponsor:

Acceptance Rates

WearSys '17 Paper Acceptance Rate 9 of 9 submissions, 100%;
Overall Acceptance Rate 28 of 36 submissions, 78%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)48
  • Downloads (Last 6 weeks)4
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media