One hour term authentication for Wi-Fi information captured by smartphone sensors
In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the oth...
Saved in:
Published in | ISITA 2016 : proceedings of 2016 International Symposium on Information Theory and Its Applications : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30 - November 2, 2016 pp. 330 - 334 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEICE
01.10.2016
|
Subjects | |
Online Access | Get full text |
Cover
Abstract | In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the other hand, such an authentication method using one behavior factor is generally seen as having low authentication accuracy. For acquiring higher authentication accuracy, several behavior information is needed as authentication factors. The current subject is to find behavior information which can be an authentication factor. In a previous study to find a behavior authentication factor, a personal authentication method has been proposed utilizing Wi-Fi information which is captured by smartphone sensors. Generally, it is necessary that behavior information of a certain term is used as authentication information for behavior authentication, while it is sufficient that information at a moment of authentication is used for biometrics such as fingerprint authentication. The previous study has proposed using 24 hours data as authentication information. However, the long authentication term may increase the possibility of spoofing when a smartphone device is stolen, because the user's information remains in the device for the term. Therefore, in this paper, we propose a new authentication method using one hour data as authentication information, and apply our proposal algorithm to 47 subjects' data. |
---|---|
AbstractList | In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the other hand, such an authentication method using one behavior factor is generally seen as having low authentication accuracy. For acquiring higher authentication accuracy, several behavior information is needed as authentication factors. The current subject is to find behavior information which can be an authentication factor. In a previous study to find a behavior authentication factor, a personal authentication method has been proposed utilizing Wi-Fi information which is captured by smartphone sensors. Generally, it is necessary that behavior information of a certain term is used as authentication information for behavior authentication, while it is sufficient that information at a moment of authentication is used for biometrics such as fingerprint authentication. The previous study has proposed using 24 hours data as authentication information. However, the long authentication term may increase the possibility of spoofing when a smartphone device is stolen, because the user's information remains in the device for the term. Therefore, in this paper, we propose a new authentication method using one hour data as authentication information, and apply our proposal algorithm to 47 subjects' data. |
Author | Kobayashi, Ryosuke Yamaguchi, Rie Shigetomi |
Author_xml | – sequence: 1 givenname: Ryosuke surname: Kobayashi fullname: Kobayashi, Ryosuke email: kobayashi.ryousuke@sict.i.u-tokyo.ac.jp organization: Univ. of Tokyo, Tokyo, Japan – sequence: 2 givenname: Rie Shigetomi surname: Yamaguchi fullname: Yamaguchi, Rie Shigetomi email: yamaguchi.rie@i.u-tokyo.ac.jp organization: Univ. of Tokyo, Tokyo, Japan |
BookMark | eNotj01qwzAUhFVooW3qE3SjCxie_ixrWULTFgIhkNBlkOwnrFLLRpIXuX0N6WqGWXwz80zu4xTxjlRGt7JtleICDDySKucfAGCmablST-R4iEiHaUm0YBqpXcqAsYTOljBF6qdEv0O9CzTE1Y-3tLNzWRL21F1pHm0q87B20YwxTym_kAdvfzNW_7oh5937aftZ7w8fX9u3fR0YqFJrDlp7y4VoPDJkwhsEzjqU1irHdNsZ8IozjtL3jXa8M6oHpy02Tjjbiw15vXEDIl7mFNYl18v6FqQE8Qf0ZUvp |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9784885523090 4885523095 |
EndPage | 334 |
ExternalDocumentID | 7840440 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i105t-72077fa2336fe1e13f9e021ce4aa5b178c90f5212e4fd67b2c95d0b7ae6b3bad3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 01:37:53 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i105t-72077fa2336fe1e13f9e021ce4aa5b178c90f5212e4fd67b2c95d0b7ae6b3bad3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7840440 |
PublicationCentury | 2000 |
PublicationDate | 2016-Oct. |
PublicationDateYYYYMMDD | 2016-10-01 |
PublicationDate_xml | – month: 10 year: 2016 text: 2016-Oct. |
PublicationDecade | 2010 |
PublicationTitle | ISITA 2016 : proceedings of 2016 International Symposium on Information Theory and Its Applications : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30 - November 2, 2016 |
PublicationTitleAbbrev | ISITA |
PublicationYear | 2016 |
Publisher | IEICE |
Publisher_xml | – name: IEICE |
SSID | ssj0001968255 |
Score | 1.6173326 |
Snippet | In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 330 |
SubjectTerms | Authentication Biometrics (access control) Electronic mail IEEE 802.11 Standard Performance evaluation Sensors Usability |
Title | One hour term authentication for Wi-Fi information captured by smartphone sensors |
URI | https://ieeexplore.ieee.org/document/7840440 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGTpwGbAgYoBw40tGuaZKeEdOENB4SE7tNebhiQnTT1h3g1-O03SYQB25RDonkOPls57MNcEWIqnhsRRAl6KNVkgdp6EmOhBWERvRWlu3bRg9iOOb3k2TSgOttLgwiluQz7Plh-Zfv5nbtQ2U3krwRzslB3yM1q3K1dvGUVJCzk_xoklJixKAFo83qFTXkvbcuTM9-_Sq8-N_tD6Czy8ZjT1ucOYQG5kfQ2rRjYPXtbMPzY47sjXSD-eeWac9dz4s6JsfIOGWvs2AwY3Wt1HLW6oX_QnDMfLLVB6mRp6ojW5FzO1-uOjAe3L3cDoO6Y0IwIzupCGQ_lDLTJGCRYYRRnKVIIG6Ra52YSCqbhpnP1kWeOSFN36aJC43UKExstIuPoZnTNifAYvLEjHLSptxxRbdUcad4P9NkQVir3Cm0vYSmi6ooxrQWztnf013YJ0tDVCy4c2gWyzVeEJoX5rI8xm_C5aLp |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEJ0QPOgJFYzf7sGjxZZuu-3ZSFABNYHIjezHNBJiIVAO-uudbQtE48Fbs4duM93dN2_2zQzANSFqxH0dOl6ANloluBO7VuRIWEFoRGdl3r6t1w87Q_44CkYVuNnkwiBiLj7Dpn3M7_LNTK9sqOxWEBvhnAj6DuE-D4psrW1EJQ6J7gQ_2qTkKNGuQW_9_kIcMm2uMtXUX79KL_73A_ahsc3HYy8bpDmACqaHUFs3ZGDl_qzD63OK7J1WB7MHLpNWvZ5mZVSOkXvK3iZOe8LKaqn5qJZze4lgmPpkyw9aSFasjmxJ9Ha2WDZg2L4f3HWcsmeCMyFPKXNEyxUikWTiMEEPPT-JkWBcI5cyUJ6IdOwmNl8XeWJCoVo6DoyrhMRQ-Uoa_wiqKU1zDMwnLqYiI3TMDY9on0bcRLyVSPIhtI7MCdSthcbzoizGuDTO6d_DV7DbGfS64-5D_-kM9sjvCAtN3DlUs8UKLwjbM3WZ_9JvdE6mNg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ISITA+2016+%3A+proceedings+of+2016+International+Symposium+on+Information+Theory+and+Its+Applications+%3A+Hyatt+Regency+Monterey+Hotel%2C+Monterey%2C+California%2C+USA%2C+October+30+-+November+2%2C+2016&rft.atitle=One+hour+term+authentication+for+Wi-Fi+information+captured+by+smartphone+sensors&rft.au=Kobayashi%2C+Ryosuke&rft.au=Yamaguchi%2C+Rie+Shigetomi&rft.date=2016-10-01&rft.pub=IEICE&rft.spage=330&rft.epage=334&rft.externalDocID=7840440 |