Skip to main content

Rhythm-Based Authentication Scheme on Smart Devices

  • Conference paper
  • First Online:
  • 2110 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

Due to computing power and advances of smart devices, recently uses of smart-phone have been rapidly increasing. Smart devices (smartphones and tablet PC etc.) threats such as a personal information leakage and fraudulent use of smart devices have also increased. So, effective measures are needed to address security issues of smart devices—authentication, access control, prevention from the attackers. In this paper, we proposed a rhythm-based user authentication scheme on smart devices. The proposed scheme complements the vulnerabilities of the existing schemes, and provides authentication that ensures availability. In additional, it provides stronger security and greater convenience.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Jaegal B (2010) Trend of smartphone market and mobile OS. Samsung Wireless Division, 6.D

    Google Scholar 

  2. Lee A, Bok D (2008) Interface technology for improving production value. Samsung Economics Research Institute (SERI) Economic Focus, No. 216, Oct 2008

    Google Scholar 

  3. Mohammed MM, Elsadig M (2013) A multi-layer of multi factors authentication model for online banking services. In: ICCEEE 2013, IEEE, pp 220–224, Aug 2013

    Google Scholar 

  4. Android Security Overview, Android open source project, http://source.android.com/devices/tech/security/

  5. Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: 4th USENIX workshop on offensive technologies, Aug 2010

    Google Scholar 

  6. Lashkari AH, Farmand S, Zakaria OB, Saleh R (2009) Shoulder surfing attack in graphical password authentication. Int J Comput Sci Inf Secur 6(2):145–154

    Google Scholar 

  7. Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. Secur Privacy IEEE 2(5):25–31

    Article  Google Scholar 

  8. Wiedenbeck S, Waters J, Birget JC, Brodskiy A, Memon N (2005) PassPoints: design and longitudinal evaluation of a graphical password system. Int J Human-Comput Stud 63(1–2):102–127

    Article  Google Scholar 

  9. Kang P, Park S, Hwang S, Lee H, Cho S (2008) Improvement of keystroke data quality through artificial rhythms and cues. Comput Secur 27(1–2):3–11

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the CPRC (Communications Policy Research Center) support program supervised by the KCA (Korea Communications Agency) (KCA-2013-003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Lee, J.D. et al. (2014). Rhythm-Based Authentication Scheme on Smart Devices. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_38

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics