WACA: Wearable-Assisted Continuous Authentication

02/28/2018
by   Abbas Acar, et al.
0

One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. In this paper, we introduce a usable and reliable method called Wearable Assisted Continuous Authentication (WACA). WACA relies on the sensor based keystroke dynamics, where the authentication data is acquired through the built in sensors of a wearable (e.g., smartwatch) while the user is typing. We implemented the WACA framework and evaluated its performance on real devices with real users. The empirical evaluation of WACA reveals that WACA is feasible and its error rate is as low as 1 percent with 30 seconds of processing time and 2 3 is minimal. Furthermore, we tested WACA against different attack scenarios. WACA is capable of identifying insider threats with very high accuracy (99.2 and also robust against powerful adversaries such as imitation and statistical attackers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/11/2021

An Ear Canal Deformation Based User Authentication Using Ear Wearable Devices

Biometric-based authentication is gaining increasing attention for weara...
research
09/21/2023

De-authentication using Ambient Light Sensor

While user authentication happens before initiating or resuming a login ...
research
12/22/2017

Evaluation of PPG Biometrics for Authentication in different states

Amongst all medical biometric traits, Photoplethysmograph (PPG) is the e...
research
10/05/2018

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices

Users with limited use of their hands, such as people suffering from dis...
research
03/07/2016

Authenticating users through their arm movement patterns

In this paper, we propose four continuous authentication designs by usin...
research
07/18/2018

Continuous Authentication of Smartphones Based on Application Usage

An empirical investigation of active/continuous authentication for smart...
research
06/15/2021

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Previous studies have demonstrated that commonly studied (vanilla) touch...

Please sign up or login with your details

Forgot password? Click here to reset