Authentication Fails

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 762 Experts worldwide ranked by ideXlab platform

Zhenjiang Li - One of the best experts on this subject based on the ideXlab platform.

  • Continuous User Authentication by Contactless Wireless Sensing
    IEEE Internet of Things Journal, 2019
    Co-Authors: F. Wang, Zhenjiang Li
    Abstract:

    This paper presents BodyPIN, which is a continuous user Authentication system by contactless wireless sensing using commodity Wi-Fi. BodyPIN can track the current user’s legal identity throughout a computer system’s execution. In case the Authentication Fails, the consequent accesses will be denied to protect the system. The recent rich wireless-based user identification designs cannot be applied to BodyPIN directly, because they identify a user’s various activities, rather than the user herself. The enforced to be performed activities can thus interrupt the user’s operations on the system, highly inconvenient and not user-friendly. In this paper, we leverage the bio-electromagnetics domain human model for quantifying the impact of human body on the bypassing Wi-Fi signals and deriving the component that indicates a user’s identity. Then, we extract suitable Wi-Fi signal features to fully represent such an identity component, based on which we fulfill the continuous user Authentication design. We implement a BodyPIN prototype by commodity Wi-Fi NICs without any extra or dedicated wireless hardware. We show that BodyPIN achieves promising Authentication performances, which is also lightweight and robust under various practical settings.

F. Wang - One of the best experts on this subject based on the ideXlab platform.

  • Continuous User Authentication by Contactless Wireless Sensing
    IEEE Internet of Things Journal, 2019
    Co-Authors: F. Wang, Zhenjiang Li
    Abstract:

    This paper presents BodyPIN, which is a continuous user Authentication system by contactless wireless sensing using commodity Wi-Fi. BodyPIN can track the current user’s legal identity throughout a computer system’s execution. In case the Authentication Fails, the consequent accesses will be denied to protect the system. The recent rich wireless-based user identification designs cannot be applied to BodyPIN directly, because they identify a user’s various activities, rather than the user herself. The enforced to be performed activities can thus interrupt the user’s operations on the system, highly inconvenient and not user-friendly. In this paper, we leverage the bio-electromagnetics domain human model for quantifying the impact of human body on the bypassing Wi-Fi signals and deriving the component that indicates a user’s identity. Then, we extract suitable Wi-Fi signal features to fully represent such an identity component, based on which we fulfill the continuous user Authentication design. We implement a BodyPIN prototype by commodity Wi-Fi NICs without any extra or dedicated wireless hardware. We show that BodyPIN achieves promising Authentication performances, which is also lightweight and robust under various practical settings.

Iqbal Ahamed - One of the best experts on this subject based on the ideXlab platform.

  • SERE (Companion) - Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    2014 IEEE Eighth International Conference on Software Security and Reliability-Companion, 2014
    Co-Authors: Farzana Rahman, G. M Tanimul Ahsan, Osman Gani, Iqbal Ahamed
    Abstract:

    Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device Authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user Authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for Authentication. This system silently does Authentication using location traces and gait pattern of its user. If the silent Authentication Fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based Authentication technique can be useful for numerous real life scenarios where mobile device security is important.

Sheikh Iqbal Ahamed - One of the best experts on this subject based on the ideXlab platform.

  • Seeing beyond visibility: A four way fusion of user Authentication for efficient usable security on mobile devices
    Proceedings - 8th International Conference on Software Security and Reliability - Companion SERE-C 2014, 2014
    Co-Authors: Faizur Rahman, G. M Tanimul Ahsan, Md Osman Gani, Sheikh Iqbal Ahamed
    Abstract:

    Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device Authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user Authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for Authentication. This system silently does Authentication using location traces and gait pattern of its user. If the silent Authentication Fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based Authentication technique can be useful for numerous real life scenarios where mobile device security is important.

G. M Tanimul Ahsan - One of the best experts on this subject based on the ideXlab platform.

  • Seeing beyond visibility: A four way fusion of user Authentication for efficient usable security on mobile devices
    Proceedings - 8th International Conference on Software Security and Reliability - Companion SERE-C 2014, 2014
    Co-Authors: Faizur Rahman, G. M Tanimul Ahsan, Md Osman Gani, Sheikh Iqbal Ahamed
    Abstract:

    Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device Authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user Authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for Authentication. This system silently does Authentication using location traces and gait pattern of its user. If the silent Authentication Fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based Authentication technique can be useful for numerous real life scenarios where mobile device security is important.

  • SERE (Companion) - Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices
    2014 IEEE Eighth International Conference on Software Security and Reliability-Companion, 2014
    Co-Authors: Farzana Rahman, G. M Tanimul Ahsan, Osman Gani, Iqbal Ahamed
    Abstract:

    Security and usability plays an important role in the success in today's computer, mobile, and technology based system. In these systems, security gets higher priority for high security measures ignoring the fact that the system may lead to an unusable one. However, everyday technology users need a system that is usable and also safe. In this paper, we propose a novel approach for usable security for mobile system i.e. a mobile system that will be usable and also secured. Traditional mobile device Authentication techniques do not consider the combination of user biometrics, environmental information, and information provided by the sensors within the pervasive system. In this paper, we present a four way fusion of user Authentication techniques for efficient usable security on mobile devices. In this approach user is not required to remember any alphanumeric password. The location traces, gait pattern, emotion of user and context of an image is used as metric for Authentication. This system silently does Authentication using location traces and gait pattern of its user. If the silent Authentication Fails then system authenticates its users based on user's emotion sequence and an image context previously stored by the user. Our proposed fusion based Authentication technique can be useful for numerous real life scenarios where mobile device security is important.