De-authentication using Ambient Light Sensor

09/21/2023
by   Ankit Gangwal, et al.
0

While user authentication happens before initiating or resuming a login session, de-authentication detects the absence of a previously-authenticated user to revoke her currently active login session. The absence of proper de-authentication can lead to well-known lunchtime attacks, where a nearby adversary takes over a carelessly departed user's running login session. The existing solutions for automatic de-authentication have distinct practical limitations, e.g., extraordinary deployment requirements or high initial cost of external equipment. In this paper, we propose "DE-authentication using Ambient Light sensor" (DEAL), a novel, inexpensive, fast, and user-friendly de-authentication approach. DEAL utilizes the built-in ambient light sensor of a modern computer to determine if the user is leaving her work-desk. DEAL, by design, is resilient to natural shifts in lighting conditions and can be configured to handle abrupt changes in ambient illumination (e.g., due to toggling of room lights). We collected data samples from 4800 sessions with 120 volunteers in 4 typical workplace settings and conducted a series of experiments to evaluate the quality of our proposed approach thoroughly. Our results show that DEAL can de-authenticate a departing user within 4 seconds with a hit rate of 89.15 a fall-out of 7.35 practically infeasible as it requires the attacker to either take the user's position within a few seconds or manipulate the sensor readings sophisticatedly in real-time.

READ FULL TEXT

page 1

page 5

page 9

research
02/28/2018

WACA: Wearable-Assisted Continuous Authentication

One-time login process in conventional authentication systems does not g...
research
04/22/2018

Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects

Keystroke timing based active authentication systems are conceptually at...
research
06/25/2023

Universal Session Protocol: A Novel Approach to Session Management

Currently, the TCP/IP model enables exploitation of vulnerabilities anon...
research
04/15/2020

Seeing Red: PPG Biometrics Using Smartphone Cameras

In this paper, we propose a system that enables photoplethysmogram (PPG)...
research
03/07/2016

Authenticating users through their arm movement patterns

In this paper, we propose four continuous authentication designs by usin...
research
02/01/2022

A Framework for Server Authentication using Communication Protocol Dialects

In today's world, computer networks have become vulnerable to numerous a...
research
09/22/2022

Affective responses to chromatic ambient light in a vehicle

This study investigates the emotional responses to the color of vehicle ...

Please sign up or login with your details

Forgot password? Click here to reset