Adversary Models for Mobile Device Authentication

09/21/2020
by   Rene Mayrhofer, et al.
0

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been proposed and analyzed. In related areas such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have already been established and are used to qualitatively and quantitatively compare different methods. Unfortunately, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we first introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We then apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. Our proposed classification of adversaries provides a strong uniform adversary model that can offer a comparable and transparent classification of security properties in mobile device authentication methods.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/06/2023

A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices

Authentication is the first defence mechanism in many electronic systems...
research
07/19/2020

PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

Physically unclonable functions (PUFs) can be employed for device identi...
research
03/03/2010

Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

Communication channel established from a display to a device's camera is...
research
03/18/2019

The epidemiology of lateral movement: exposures and countermeasures with network contagion models

An approach is developed for analyzing computer networks to identify sys...
research
08/28/2018

Analysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)

For many years, the pay-TV system has attracted a lot of users. Users ha...
research
11/28/2022

Security Analysis of the Consumer Remote SIM Provisioning Protocol

Remote SIM provisioning (RSP) for consumer devices is the protocol speci...
research
05/25/2021

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey

Cash payment is still king in several markets, accounting for more than ...

Please sign up or login with your details

Forgot password? Click here to reset