Contextual Authentication and Authorization using Wearable Devices
No Thumbnail Available
URL
Journal Title
Journal ISSN
Volume Title
Perustieteiden korkeakoulu |
Master's thesis
Ask about the availability of the thesis by sending email to the Aalto University Learning Centre oppimiskeskus@aalto.fi
Authors
Date
2016-01-18
Department
Major/Subject
Mobile Computing - Services and Security
Mcode
T3010
Degree programme
Master's Programme in Mobile Computing - Services and Security
Language
en
Pages
87 + 8
Series
Abstract
With the proliferation of computing devices in daily lives the effective authentication has become essential. Most of the common authentication schemes perform one time authentication and rely on users to deauthenticate. These authentication schemes require users to remember secrets, or additional hardware, or should learn behavioral characteristics to authenticate users. ZEBRA is a prominent continuous authentication scheme which promises zero-effort deauthentication. However, the authors of ZEBRA did not implement a real time end-to-end ZEBRA system in their experiments. We attempt to replicate ZEBRA in a real time end-to-end fashion using commercially available devices to verify its usability and deployability in real life usage scenarios. Using our learning while implementing and experimenting with ZEBRA, we point out important limitations of the ZEBRA architecture and suggest an improved architecture. In order to enhance security features provided by ZEBRA, we attempt to integrate a proximity based solution with ZEBRA. We also suggest modifications to make the system more effective.Description
Supervisor
Asokan, N.Thesis advisor
Juuti, MikaHuhta, Otto
Keywords
wearable, continuous authentication, deauthentication, bilateral