Home > Research > Publications & Outputs > Using contextual co-presence to strengthen Zero...

Links

Text available via DOI:

View graph of relations

Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. / Truong, Hien Thi Thu; Gao, Xiang; Shrestha, Babins et al.
In: Pervasive and Mobile Computing, Vol. 16, No. B, 01.2015, p. 187-204.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Truong, HTT, Gao, X, Shrestha, B, Saxena, N, Asokan, N & Nurmi, P 2015, 'Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability', Pervasive and Mobile Computing, vol. 16, no. B, pp. 187-204. https://doi.org/10.1016/j.pmcj.2014.10.005

APA

Truong, H. T. T., Gao, X., Shrestha, B., Saxena, N., Asokan, N., & Nurmi, P. (2015). Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. Pervasive and Mobile Computing, 16(B), 187-204. https://doi.org/10.1016/j.pmcj.2014.10.005

Vancouver

Truong HTT, Gao X, Shrestha B, Saxena N, Asokan N, Nurmi P. Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability. Pervasive and Mobile Computing. 2015 Jan;16(B):187-204. Epub 2014 Oct 29. doi: 10.1016/j.pmcj.2014.10.005

Author

Truong, Hien Thi Thu ; Gao, Xiang ; Shrestha, Babins et al. / Using contextual co-presence to strengthen Zero-Interaction Authentication : Design, integration and usability. In: Pervasive and Mobile Computing. 2015 ; Vol. 16, No. B. pp. 187-204.

Bibtex

@article{00b86aa4fa1f40a3a78d21ffc84ac1ba,
title = "Using contextual co-presence to strengthen Zero-Interaction Authentication: Design, integration and usability",
abstract = "Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user{\textquoteright}s personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks.In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev–Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.Finally, based on our analysis, we integrate our contextual co-presence detection system with a real-world ZIA application, BlueProximity [1], so as to enhance its security against relay attacks. We describe the design of the BlueProximity++ application and present results from a small-scale user study that evaluated its effectiveness.",
keywords = "Relay attack, Multiple sensors, Zero interaction authentication",
author = "Truong, {Hien Thi Thu} and Xiang Gao and Babins Shrestha and Nitesh Saxena and N. Asokan and Petteri Nurmi",
note = "Selected Papers from the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014)",
year = "2015",
month = jan,
doi = "10.1016/j.pmcj.2014.10.005",
language = "English",
volume = "16",
pages = "187--204",
journal = "Pervasive and Mobile Computing",
issn = "1574-1192",
publisher = "Elsevier Science B.V.",
number = "B",

}

RIS

TY - JOUR

T1 - Using contextual co-presence to strengthen Zero-Interaction Authentication

T2 - Design, integration and usability

AU - Truong, Hien Thi Thu

AU - Gao, Xiang

AU - Shrestha, Babins

AU - Saxena, Nitesh

AU - Asokan, N.

AU - Nurmi, Petteri

N1 - Selected Papers from the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014)

PY - 2015/1

Y1 - 2015/1

N2 - Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user’s personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks.In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev–Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.Finally, based on our analysis, we integrate our contextual co-presence detection system with a real-world ZIA application, BlueProximity [1], so as to enhance its security against relay attacks. We describe the design of the BlueProximity++ application and present results from a small-scale user study that evaluated its effectiveness.

AB - Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user’s personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks.In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev–Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.Finally, based on our analysis, we integrate our contextual co-presence detection system with a real-world ZIA application, BlueProximity [1], so as to enhance its security against relay attacks. We describe the design of the BlueProximity++ application and present results from a small-scale user study that evaluated its effectiveness.

KW - Relay attack

KW - Multiple sensors

KW - Zero interaction authentication

U2 - 10.1016/j.pmcj.2014.10.005

DO - 10.1016/j.pmcj.2014.10.005

M3 - Journal article

VL - 16

SP - 187

EP - 204

JO - Pervasive and Mobile Computing

JF - Pervasive and Mobile Computing

SN - 1574-1192

IS - B

ER -