TY - GEN
T1 - Your song your way
T2 - 34th IEEE Annual Conference on Computer Communications and Networks, IEEE INFOCOM 2015
AU - Chen, Yimin
AU - Sun, Jingchao
AU - Zhang, Rui
AU - Zhang, Yanchao
N1 - Publisher Copyright:
© 2015 IEEE.
Copyright:
Copyright 2016 Elsevier B.V., All rights reserved.
PY - 2015/8/21
Y1 - 2015/8/21
N2 - Multi-touch mobile devices have penetrated into everyday life to support personal and business communications. Secure and usable authentication techniques are indispensable for preventing illegitimate access to mobile devices. This paper presents RhyAuth, a novel two-factor rhythm-based authentication scheme for multi-touch mobile devices. RhyAuth requires a user to perform a sequence of rhythmic taps/slides on a device screen to unlock the device. The user is authenticated and admitted only when the features extracted from her rhythmic taps/slides match those stored on the device. RhyAuth is a two-factor authentication scheme that depends on a user-chosen rhythm and also the behavioral metrics for inputting the rhythm. Through a 32-user experiment on Android devices, we show that RhyAuth is highly secure against various attacks and also very usable for both sighted and visually impaired people.
AB - Multi-touch mobile devices have penetrated into everyday life to support personal and business communications. Secure and usable authentication techniques are indispensable for preventing illegitimate access to mobile devices. This paper presents RhyAuth, a novel two-factor rhythm-based authentication scheme for multi-touch mobile devices. RhyAuth requires a user to perform a sequence of rhythmic taps/slides on a device screen to unlock the device. The user is authenticated and admitted only when the features extracted from her rhythmic taps/slides match those stored on the device. RhyAuth is a two-factor authentication scheme that depends on a user-chosen rhythm and also the behavioral metrics for inputting the rhythm. Through a 32-user experiment on Android devices, we show that RhyAuth is highly secure against various attacks and also very usable for both sighted and visually impaired people.
UR - http://www.scopus.com/inward/record.url?scp=84954505754&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84954505754&partnerID=8YFLogxK
U2 - 10.1109/INFOCOM.2015.7218660
DO - 10.1109/INFOCOM.2015.7218660
M3 - Conference contribution
AN - SCOPUS:84954505754
T3 - Proceedings - IEEE INFOCOM
SP - 2686
EP - 2694
BT - 2015 IEEE Conference on Computer Communications, IEEE INFOCOM 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 26 April 2015 through 1 May 2015
ER -