Mobile device sensorhistory as a second factor for authentication

Despite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that p...

Full description

Bibliographic Details
Main Author: Vaas, C
Format: Working paper
Language:English
Published: 2015
Subjects:
_version_ 1826289946208501760
author Vaas, C
author_facet Vaas, C
author_sort Vaas, C
collection OXFORD
description Despite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that provide their users with two-factor authentication. Although one could argue that the physical machine loses importance with the shift towards having everything in the cloud ranging from software over platforms to infrastructure there is still a need of securing the endpoint at which these services are accessed. For this purpose, often software or hardware tokens are used along the password in a two-factor authentication scenario. Examples are RSA tokens, software tokens like the Google authenticator or NFC smart cards. A common issue with these solutions is that they are vulnerable to relay attacks. We thus propose a second factor which is resilient to these kind of attacks. To do so it is necessary to guarantee the physical co-presence of the authenticating device and the second factor, e.g. a smart phone. This project aims to ensure this property using the gyroscope history of a smart phone and validating it against received signal strength measurements conducted by WiFi checkpoints within the perimeter, e.g. office building, of the authenticating machine. This makes sure that the smart phone wielder actually walked to the machine and the phone is thus present where the user claims.
first_indexed 2024-03-07T02:36:39Z
format Working paper
id oxford-uuid:a90299f6-b6a8-4a0f-a142-9f4f5e121989
institution University of Oxford
language English
last_indexed 2024-03-07T02:36:39Z
publishDate 2015
record_format dspace
spelling oxford-uuid:a90299f6-b6a8-4a0f-a142-9f4f5e1219892022-03-27T03:05:30ZMobile device sensorhistory as a second factor for authenticationWorking paperhttp://purl.org/coar/resource_type/c_8042uuid:a90299f6-b6a8-4a0f-a142-9f4f5e121989ComputersComputer securityCyber intelligence (Computer security)EnglishORA Deposit2015Vaas, CDespite the availability of biometrics like face recognition and finger print scanners passwords are still a common widely accepted way to secure personal computers and business workstations. This stands in contrast with security measures we can find for cloud services like Dropbox and Google that provide their users with two-factor authentication. Although one could argue that the physical machine loses importance with the shift towards having everything in the cloud ranging from software over platforms to infrastructure there is still a need of securing the endpoint at which these services are accessed. For this purpose, often software or hardware tokens are used along the password in a two-factor authentication scenario. Examples are RSA tokens, software tokens like the Google authenticator or NFC smart cards. A common issue with these solutions is that they are vulnerable to relay attacks. We thus propose a second factor which is resilient to these kind of attacks. To do so it is necessary to guarantee the physical co-presence of the authenticating device and the second factor, e.g. a smart phone. This project aims to ensure this property using the gyroscope history of a smart phone and validating it against received signal strength measurements conducted by WiFi checkpoints within the perimeter, e.g. office building, of the authenticating machine. This makes sure that the smart phone wielder actually walked to the machine and the phone is thus present where the user claims.
spellingShingle Computers
Computer security
Cyber intelligence (Computer security)
Vaas, C
Mobile device sensorhistory as a second factor for authentication
title Mobile device sensorhistory as a second factor for authentication
title_full Mobile device sensorhistory as a second factor for authentication
title_fullStr Mobile device sensorhistory as a second factor for authentication
title_full_unstemmed Mobile device sensorhistory as a second factor for authentication
title_short Mobile device sensorhistory as a second factor for authentication
title_sort mobile device sensorhistory as a second factor for authentication
topic Computers
Computer security
Cyber intelligence (Computer security)
work_keys_str_mv AT vaasc mobiledevicesensorhistoryasasecondfactorforauthentication