Implicit user re-authentication for mobile devices

Sausan Yazji*, Xi Chen, Robert P. Dick, Peter Scheuermann

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Abstract

Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are therefore susceptible to theft and unauthorized access. We propose an implicit user re-authentication system for portable computers that requires no application changes or hardware modifications. The proposed technique observes user-specific patterns in filesystem activity and network access to build models of normal behavior. These are used to distinguish between normal use and anomalous use. We describe these automated model generation and user detection techniques, and explain how to efficiently implement them in a wireless distributed system composed of servers and battery-powered portable devices. The proposed system is able to distinguish between normal use and attack with an accuracy of approximately 90% every 5 minutes and consumes less than 12% of a typical laptop battery in 24 hours.

Original languageEnglish (US)
Title of host publicationUbiquitous Intelligence and Computing - 6th International Conference, UIC 2009, Proceedings
Pages325-339
Number of pages15
DOIs
StatePublished - Nov 9 2009
Event6th International Conference on Ubiquitous Intelligence and Computing, UIC 2009 - Brisbane, QLD, Australia
Duration: Jul 7 2009Jul 9 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5585 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Conference on Ubiquitous Intelligence and Computing, UIC 2009
CountryAustralia
CityBrisbane, QLD
Period7/7/097/9/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Implicit user re-authentication for mobile devices'. Together they form a unique fingerprint.

Cite this