One hour term authentication for Wi-Fi information captured by smartphone sensors

In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the oth...

Full description

Saved in:
Bibliographic Details
Published inISITA 2016 : proceedings of 2016 International Symposium on Information Theory and Its Applications : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30 - November 2, 2016 pp. 330 - 334
Main Authors Kobayashi, Ryosuke, Yamaguchi, Rie Shigetomi
Format Conference Proceeding
LanguageEnglish
Published IEICE 01.10.2016
Subjects
Online AccessGet full text

Cover

Abstract In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the other hand, such an authentication method using one behavior factor is generally seen as having low authentication accuracy. For acquiring higher authentication accuracy, several behavior information is needed as authentication factors. The current subject is to find behavior information which can be an authentication factor. In a previous study to find a behavior authentication factor, a personal authentication method has been proposed utilizing Wi-Fi information which is captured by smartphone sensors. Generally, it is necessary that behavior information of a certain term is used as authentication information for behavior authentication, while it is sufficient that information at a moment of authentication is used for biometrics such as fingerprint authentication. The previous study has proposed using 24 hours data as authentication information. However, the long authentication term may increase the possibility of spoofing when a smartphone device is stolen, because the user's information remains in the device for the term. Therefore, in this paper, we propose a new authentication method using one hour data as authentication information, and apply our proposal algorithm to 47 subjects' data.
AbstractList In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may offer high usability for users because they do not require registration and authentication information to be entered manually. On the other hand, such an authentication method using one behavior factor is generally seen as having low authentication accuracy. For acquiring higher authentication accuracy, several behavior information is needed as authentication factors. The current subject is to find behavior information which can be an authentication factor. In a previous study to find a behavior authentication factor, a personal authentication method has been proposed utilizing Wi-Fi information which is captured by smartphone sensors. Generally, it is necessary that behavior information of a certain term is used as authentication information for behavior authentication, while it is sufficient that information at a moment of authentication is used for biometrics such as fingerprint authentication. The previous study has proposed using 24 hours data as authentication information. However, the long authentication term may increase the possibility of spoofing when a smartphone device is stolen, because the user's information remains in the device for the term. Therefore, in this paper, we propose a new authentication method using one hour data as authentication information, and apply our proposal algorithm to 47 subjects' data.
Author Kobayashi, Ryosuke
Yamaguchi, Rie Shigetomi
Author_xml – sequence: 1
  givenname: Ryosuke
  surname: Kobayashi
  fullname: Kobayashi, Ryosuke
  email: kobayashi.ryousuke@sict.i.u-tokyo.ac.jp
  organization: Univ. of Tokyo, Tokyo, Japan
– sequence: 2
  givenname: Rie Shigetomi
  surname: Yamaguchi
  fullname: Yamaguchi, Rie Shigetomi
  email: yamaguchi.rie@i.u-tokyo.ac.jp
  organization: Univ. of Tokyo, Tokyo, Japan
BookMark eNotj01qwzAUhFVooW3qE3SjCxie_ixrWULTFgIhkNBlkOwnrFLLRpIXuX0N6WqGWXwz80zu4xTxjlRGt7JtleICDDySKucfAGCmablST-R4iEiHaUm0YBqpXcqAsYTOljBF6qdEv0O9CzTE1Y-3tLNzWRL21F1pHm0q87B20YwxTym_kAdvfzNW_7oh5937aftZ7w8fX9u3fR0YqFJrDlp7y4VoPDJkwhsEzjqU1irHdNsZ8IozjtL3jXa8M6oHpy02Tjjbiw15vXEDIl7mFNYl18v6FqQE8Qf0ZUvp
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9784885523090
4885523095
EndPage 334
ExternalDocumentID 7840440
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i105t-72077fa2336fe1e13f9e021ce4aa5b178c90f5212e4fd67b2c95d0b7ae6b3bad3
IEDL.DBID RIE
IngestDate Wed Aug 27 01:37:53 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i105t-72077fa2336fe1e13f9e021ce4aa5b178c90f5212e4fd67b2c95d0b7ae6b3bad3
PageCount 5
ParticipantIDs ieee_primary_7840440
PublicationCentury 2000
PublicationDate 2016-Oct.
PublicationDateYYYYMMDD 2016-10-01
PublicationDate_xml – month: 10
  year: 2016
  text: 2016-Oct.
PublicationDecade 2010
PublicationTitle ISITA 2016 : proceedings of 2016 International Symposium on Information Theory and Its Applications : Hyatt Regency Monterey Hotel, Monterey, California, USA, October 30 - November 2, 2016
PublicationTitleAbbrev ISITA
PublicationYear 2016
Publisher IEICE
Publisher_xml – name: IEICE
SSID ssj0001968255
Score 1.6173326
Snippet In recent years, an authentication method using humans' behavior is paid attention to such as risk-based authentication. A behavior authentication method may...
SourceID ieee
SourceType Publisher
StartPage 330
SubjectTerms Authentication
Biometrics (access control)
Electronic mail
IEEE 802.11 Standard
Performance evaluation
Sensors
Usability
Title One hour term authentication for Wi-Fi information captured by smartphone sensors
URI https://ieeexplore.ieee.org/document/7840440
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLbGTpwGbAgYoBw40tGuaZKeEdOENB4SE7tNebhiQnTT1h3g1-O03SYQB25RDonkOPls57MNcEWIqnhsRRAl6KNVkgdp6EmOhBWERvRWlu3bRg9iOOb3k2TSgOttLgwiluQz7Plh-Zfv5nbtQ2U3krwRzslB3yM1q3K1dvGUVJCzk_xoklJixKAFo83qFTXkvbcuTM9-_Sq8-N_tD6Czy8ZjT1ucOYQG5kfQ2rRjYPXtbMPzY47sjXSD-eeWac9dz4s6JsfIOGWvs2AwY3Wt1HLW6oX_QnDMfLLVB6mRp6ojW5FzO1-uOjAe3L3cDoO6Y0IwIzupCGQ_lDLTJGCRYYRRnKVIIG6Ra52YSCqbhpnP1kWeOSFN36aJC43UKExstIuPoZnTNifAYvLEjHLSptxxRbdUcad4P9NkQVir3Cm0vYSmi6ooxrQWztnf013YJ0tDVCy4c2gWyzVeEJoX5rI8xm_C5aLp
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEJ0QPOgJFYzf7sGjxZZuu-3ZSFABNYHIjezHNBJiIVAO-uudbQtE48Fbs4duM93dN2_2zQzANSFqxH0dOl6ANloluBO7VuRIWEFoRGdl3r6t1w87Q_44CkYVuNnkwiBiLj7Dpn3M7_LNTK9sqOxWEBvhnAj6DuE-D4psrW1EJQ6J7gQ_2qTkKNGuQW_9_kIcMm2uMtXUX79KL_73A_ahsc3HYy8bpDmACqaHUFs3ZGDl_qzD63OK7J1WB7MHLpNWvZ5mZVSOkXvK3iZOe8LKaqn5qJZze4lgmPpkyw9aSFasjmxJ9Ha2WDZg2L4f3HWcsmeCMyFPKXNEyxUikWTiMEEPPT-JkWBcI5cyUJ6IdOwmNl8XeWJCoVo6DoyrhMRQ-Uoa_wiqKU1zDMwnLqYiI3TMDY9on0bcRLyVSPIhtI7MCdSthcbzoizGuDTO6d_DV7DbGfS64-5D_-kM9sjvCAtN3DlUs8UKLwjbM3WZ_9JvdE6mNg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ISITA+2016+%3A+proceedings+of+2016+International+Symposium+on+Information+Theory+and+Its+Applications+%3A+Hyatt+Regency+Monterey+Hotel%2C+Monterey%2C+California%2C+USA%2C+October+30+-+November+2%2C+2016&rft.atitle=One+hour+term+authentication+for+Wi-Fi+information+captured+by+smartphone+sensors&rft.au=Kobayashi%2C+Ryosuke&rft.au=Yamaguchi%2C+Rie+Shigetomi&rft.date=2016-10-01&rft.pub=IEICE&rft.spage=330&rft.epage=334&rft.externalDocID=7840440