Good Vibes! Towards Phone-to-User Authentication Through Wristwatch Vibrations
- URL: http://arxiv.org/abs/2406.01738v1
- Date: Mon, 3 Jun 2024 18:59:52 GMT
- Title: Good Vibes! Towards Phone-to-User Authentication Through Wristwatch Vibrations
- Authors: Jakob Dittrich, Rainhard Dieter Findling,
- Abstract summary: We present GoodVibes authentication, a variant of mobile device-to-user authentication, where the user's phone authenticates to the user through their wristwatch vibrating in their pre-selected authentication vibration pattern.
We implement GoodVibes authentication as an Android prototype, evaluate different authentication scenarios with 30 participants, and find users to be able to well recognize and distinguish their authentication vibration pattern from different patters, from unrelated vibrations, and from the pattern being absent.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: While mobile devices frequently require users to authenticate to prevent unauthorized access, mobile devices typically do not authenticate to their users. This leaves room for users to unwittingly interact with different mobile devices. We present GoodVibes authentication, a variant of mobile device-to-user authentication, where the user's phone authenticates to the user through their wristwatch vibrating in their pre-selected authentication vibration pattern. We implement GoodVibes authentication as an Android prototype, evaluate different authentication scenarios with 30 participants, and find users to be able to well recognize and distinguish their authentication vibration pattern from different patters, from unrelated vibrations, and from the pattern being absent.
Related papers
- User-to-PC Authentication Through Confirmation on Mobile Devices: On Usability and Performance [0.0]
We utilize a token-based passwordless approach where users authenticate to their PC by confirming the authentication request on their smartphones or smartwatches.<n>We evaluate button tap and biometric fingerprint verification as confirmation variants, and compare their authentication duration, success rate, and usability to traditional password-based authentication.
arXiv Detail & Related papers (2025-07-12T08:17:59Z) - FingerSlid: Towards Finger-Sliding Continuous Authentication on Smart Devices Via Vibration [9.39889406833753]
We propose an authentication system, FingerSlid, which uses vibration motors and accelerometers in mobile devices to sense biometric features of sliding fingers.
FingerSlid is evaluated through a large number of experiments under different scenarios.
It achieves an average accuracy of 95.4% and can resist 99.5% of attacks.
arXiv Detail & Related papers (2025-04-01T05:38:58Z) - Personalized Language Model Learning on Text Data Without User Identifiers [79.36212347601223]
We propose to let each mobile device maintain a user-specific distribution to dynamically generate user embeddings.
To prevent the cloud from tracking users via uploaded embeddings, the local distributions of different users should either be derived from a linearly dependent space.
Evaluation on both public and industrial datasets reveals a remarkable improvement in accuracy from incorporating anonymous user embeddings.
arXiv Detail & Related papers (2025-01-10T15:46:19Z) - Evaluating the Influence of Multi-Factor Authentication and Recovery Settings on the Security and Accessibility of User Accounts [0.0]
This paper presents a study on the account settings of Google and Apple users.
Considering the multi-factor authentication configuration and recovery options, we analyzed the account security and lock-out risks.
Our results provide insights into the usage of multi-factor authentication in practice, show significant security differences between Google and Apple accounts, and reveal that many users would miss access to their accounts when losing a single authentication device.
arXiv Detail & Related papers (2024-03-22T10:05:37Z) - A Novel Protocol Using Captive Portals for FIDO2 Network Authentication [45.84205238554709]
We introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol.
We develop a prototype of FIDO2CAP authentication in a mock scenario.
This work makes the first systematic approach for adapting network authentication to the new authentication paradigm relying on FIDO2 authentication.
arXiv Detail & Related papers (2024-02-20T09:55:20Z) - Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication [0.44998333629984877]
We present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML)
Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator ( RSSI) values from Wi-Fi Access Points (APs)
For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access.
arXiv Detail & Related papers (2024-01-12T14:58:15Z) - Improving the Security of Smartwatch Payment with Deep Learning [0.0]
This dissertation investigates whether applications of deep learning can reduce the number of gestures a user must provide to enrol into an authentication system for smartwatch payment.
We firstly construct a deep-learned authentication system that outperforms the current state-of-the-art.
We then develop a regularised autoencoder model for generating synthetic user-specific gestures.
arXiv Detail & Related papers (2023-07-11T17:02:21Z) - Locally Authenticated Privacy-preserving Voice Input [10.82818142802482]
Service providers must authenticate their users, although individuals may wish to maintain privacy.
Preserving privacy while performing authentication is challenging, particularly where adversaries can use biometric data to train transformation tools.
We introduce a secure, flexible privacy-preserving system to capture and store an on-device fingerprint of the users' raw signals.
arXiv Detail & Related papers (2022-05-27T14:56:01Z) - Mobile Behavioral Biometrics for Passive Authentication [65.94403066225384]
This work carries out a comparative analysis of unimodal and multimodal behavioral biometric traits.
Experiments are performed over HuMIdb, one of the largest and most comprehensive freely available mobile user interaction databases.
In our experiments, the most discriminative background sensor is the magnetometer, whereas among touch tasks the best results are achieved with keystroke.
arXiv Detail & Related papers (2022-03-14T17:05:59Z) - RealGait: Gait Recognition for Person Re-Identification [79.67088297584762]
We construct a new gait dataset by extracting silhouettes from an existing video person re-identification challenge which consists of 1,404 persons walking in an unconstrained manner.
Our results suggest that recognizing people by their gait in real surveillance scenarios is feasible and the underlying gait pattern is probably the true reason why video person re-idenfification works in practice.
arXiv Detail & Related papers (2022-01-13T06:30:56Z) - Federated Learning of User Verification Models Without Sharing
Embeddings [73.27015469166166]
Federated User Verification (FedUV) is a framework in which users jointly learn a set of vectors and maximize the correlation of their instance embeddings with a secret linear combination of those vectors.
We show that choosing the linear combinations from the codewords of an error-correcting code allows users to collaboratively train the model without revealing their embedding vectors.
arXiv Detail & Related papers (2021-04-18T08:51:39Z) - Federated Learning-based Active Authentication on Mobile Devices [98.23904302910022]
User active authentication on mobile devices aims to learn a model that can correctly recognize the enrolled user based on device sensor information.
We propose a novel user active authentication training, termed as Federated Active Authentication (FAA)
We show that existing FL/SL methods are suboptimal for FAA as they rely on the data to be distributed homogeneously.
arXiv Detail & Related papers (2021-04-14T22:59:08Z) - Multimodal Personal Ear Authentication Using Smartphones [0.0]
fingerprint authentication cannot be used when hands are wet, and face recognition cannot be used when a person is wearing a mask.
We examine a personal authentication system using the pinna as a new approach for biometric authentication on smartphones.
arXiv Detail & Related papers (2021-03-23T14:19:15Z) - Federated Learning of User Authentication Models [69.93965074814292]
We propose Federated User Authentication (FedUA), a framework for privacy-preserving training of machine learning models.
FedUA adopts federated learning framework to enable a group of users to jointly train a model without sharing the raw inputs.
We show our method is privacy-preserving, scalable with number of users, and allows new users to be added to training without changing the output layer.
arXiv Detail & Related papers (2020-07-09T08:04:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.