usability challenge and a novel risk-based adaptive user authentication mechanism is proposed to address this challenge. Towards this direction, we, firstly, discuss risk-based and adaptive authentication for mobile devices as a suitable approach to deal with the security vs. Therefore, to ensure high level of device security without interrupting border control activities, strong secure and usable user authentication mechanisms are required. Nevertheless, these devices are expected to handle highly confidential personal data and thus, it is very likely to become an attractive target to malicious actors. However, although the continuously increasing number of visitors, entering the EU through land-border crossing points or seaports, brings immense economic value, novel border control solutions, such as mobile devices for passenger identification for land/sea border control, are essential to precisely identify passengers “on the fly” ensuring their comfort. Nowadays the critical sector of transport becomes progressively more dependent on digital technologies to perform essential activities and develop novel efficient transport services and infrastructure to empower economic and social cohesion exploiting the economic strengths of the European Union (EU). IDeAuth achieves a Half Total Error Rate (HTER) of ≈ 4% after applying a decision-level-fusion enhancing the best individual classifier's performance by ≈ 1%. The user verification process employs four different one-class classifiers (OCCs), which is evaluated on the collected dataset using the holdout test method. We design and develop an Android-based prototype application as a proof-of-concept and collect a new dataset consisting of 21263 observations from 41 users in a real scenario. IDeAuth verifies legitimate owners of their smartphones by exploiting their micro hand-movements and decides to sign off the default user account revoking security-sensitive applications and services linked with it. IDeAuth is an implicit deauthentication scheme that aims to minimize unauthorized access to security-sensitive applications and services running on users' smartphones when unauthorized access or intrusions are detected. Many studies have shown that single entry-point authentication schemes for smartphones can easily be circumvented.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |