Abstract
Due to computing power and advances of smart devices, recently uses of smart-phone have been rapidly increasing. Smart devices (smartphones and tablet PC etc.) threats such as a personal information leakage and fraudulent use of smart devices have also increased. So, effective measures are needed to address security issues of smart devices—authentication, access control, prevention from the attackers. In this paper, we proposed a rhythm-based user authentication scheme on smart devices. The proposed scheme complements the vulnerabilities of the existing schemes, and provides authentication that ensures availability. In additional, it provides stronger security and greater convenience.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Jaegal B (2010) Trend of smartphone market and mobile OS. Samsung Wireless Division, 6.D
Lee A, Bok D (2008) Interface technology for improving production value. Samsung Economics Research Institute (SERI) Economic Focus, No. 216, Oct 2008
Mohammed MM, Elsadig M (2013) A multi-layer of multi factors authentication model for online banking services. In: ICCEEE 2013, IEEE, pp 220–224, Aug 2013
Android Security Overview, Android open source project, http://source.android.com/devices/tech/security/
Aviv AJ, Gibson K, Mossop E, Blaze M, Smith JM (2010) Smudge attacks on smartphone touch screens. In: 4th USENIX workshop on offensive technologies, Aug 2010
Lashkari AH, Farmand S, Zakaria OB, Saleh R (2009) Shoulder surfing attack in graphical password authentication. Int J Comput Sci Inf Secur 6(2):145–154
Yan J, Blackwell A, Anderson R, Grant A (2004) Password memorability and security: empirical results. Secur Privacy IEEE 2(5):25–31
Wiedenbeck S, Waters J, Birget JC, Brodskiy A, Memon N (2005) PassPoints: design and longitudinal evaluation of a graphical password system. Int J Human-Comput Stud 63(1–2):102–127
Kang P, Park S, Hwang S, Lee H, Cho S (2008) Improvement of keystroke data quality through artificial rhythms and cues. Comput Secur 27(1–2):3–11
Acknowledgments
This research was supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the CPRC (Communications Policy Research Center) support program supervised by the KCA (Korea Communications Agency) (KCA-2013-003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Lee, J.D. et al. (2014). Rhythm-Based Authentication Scheme on Smart Devices. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_38
Download citation
DOI: https://doi.org/10.1007/978-94-017-8798-7_38
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8797-0
Online ISBN: 978-94-017-8798-7
eBook Packages: EngineeringEngineering (R0)