skip to main content
10.1145/3290607.3313093acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

UltraSonic Watch: Seamless Two-Factor Authentication through Ultrasound

Published: 02 May 2019 Publication History

Abstract

Two-factor authentication (2FA) provides an extra layer of security as it requires two pieces of evidence to be provided to an authentication mechanism before granting access to a user. However, people do not prefer 2FA; a reason for this is that 2FA requires performing extra actions. In this late-breaking work, we present UltraSonic Watch which provides a seamless 2FA through ultrasound. We report a small-scale within-subjects study (N=30) which investigates the performance of UltraSonic Watch and the participants' experience (in terms of perception, preference, and willingness to adopt). The results are promising as they revealed that ultrasound can be used to provide an efficient 2FA mechanism, transparent to the users, who are positive in adopting such an approach to increase the security of the authentication process.

References

[1]
Ioannis Agadakos, Per Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, and Georgios Portokalidis. 2016. Locationenhanced Authentication Using the IoT: Because You Cannot Be in Two Places at Once. In Proceedings of the 32Nd Annual Conference on Computer Security Applications (ACSAC '16). ACM, New York, NY, USA, 251--264.
[2]
Mozhgan Azimpourkivi, Umut Topkara, and Bogdan Carbunar. 2017. Camera Based Two Factor Authentication Through Mobile and Wearable Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 35 (Sept. 2017), 37 pages.
[3]
Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. ?It's Not Actually That Horrible": Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 456, 11 pages.
[4]
Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, and Dirk Balfanz. 2012. Strengthening User Authentication Through Opportunistic Cryptographic Identity Assertions. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS '12). ACM, New York, NY, USA, 404--414.
[5]
Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yaochao Zhang, and Terri Hedgpeth. 2018. Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). ACM, New York, NY, USA, 401--415.
[6]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan apkun. 2015. Sound-proof: Usable Two-factor Authentication Based on Ambient Sound. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 483--498. http://dl.acm.org/citation.cfm?id=2831143.2831174
[7]
Christina Katsini, Christos Fidas, George E. Raptis, Marios Belk, George Samaras, and Nikolaos Avouris. 2018. Influences of Human Cognition and Visual Behavior on Password Strength During Picture Password Composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, Article 87, 14 pages.
[8]
Jess McIntosh, Asier Marzo, Mike Fraser, and Carol Phillips. 2017. EchoFlex: Hand Gesture Recognition Using Ultrasound Imaging. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 1923--1934.
[9]
Prakash Shrestha and Nitesh Saxena. 2018. Listening Watch: Wearable Two-Factor Authentication Using Speech Signals Resilient to Near-Far Attacks. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '18). ACM, New York, NY, USA, 99--110.
[10]
Graham Wilson, Thomas Carter, Sriram Subramanian, and Stephen A. Brewster. 2014. Perception of Ultrasonic Haptic Feedback on the Hand: Localisation and Apparent Motion. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 1133--1142.
[11]
Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. 2018. EchoPrint: Two-factor Authentication Using Acoustics and Vision on Smartphones. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18). ACM, New York, NY, USA, 321--336.

Cited By

View all
  • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
  • (2024)UWB-Auth: A UWB-based Two Factor Authentication PlatformProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656113(185-195)Online publication date: 27-May-2024
  • (2024)Cue-based two factor authenticationComputers and Security10.1016/j.cose.2024.104068146:COnline publication date: 1-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '19: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems
May 2019
3673 pages
ISBN:9781450359719
DOI:10.1145/3290607
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2019

Check for updates

Author Tags

  1. internet of things (iot)
  2. seamless authentication
  3. two-factor authentication (2fa)
  4. ultrasonic sensor

Qualifiers

  • Abstract

Conference

CHI '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
  • (2024)UWB-Auth: A UWB-based Two Factor Authentication PlatformProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656113(185-195)Online publication date: 27-May-2024
  • (2024)Cue-based two factor authenticationComputers and Security10.1016/j.cose.2024.104068146:COnline publication date: 1-Nov-2024
  • (2023)VibPathProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36108947:3(1-26)Online publication date: 27-Sep-2023
  • (2022)SMS OTP Security (SOS)Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security10.1145/3488932.3497756(2-16)Online publication date: 30-May-2022
  • (2020)Audiouth: Multi-factor Authentication Based on Audio SignalProceedings of the Future Technologies Conference (FTC) 2020, Volume 310.1007/978-3-030-63092-8_64(935-946)Online publication date: 31-Oct-2020
  • (2020)Sequence Based Two-Factor Authentication (2FA) MethodHCI International 2020 – Late Breaking Posters10.1007/978-3-030-60700-5_15(116-122)Online publication date: 8-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media