Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.11.2109

User Authentication Method Using Smartphone and Smartwatch  

Seo, Hwa-jeong (Department of IT Engineering, Hansung University)
Abstract
Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.
Keywords
Authentication; Personal Identification Number; Acceleration Sensor; Smartphone; Smartwatch;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The phone lock: audio and haptic shoulder-surng resistant PIN entry methods for mobile devices," In Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, Funchal, pp. 197-200, 2011.
2 M. Lee, H. Nam, and D. Kim, "Secure bimodal PIN-entry method using audio signals," Computers & Security, vol. 56, pp. 140-150, Feb. 2016.   DOI
3 H. Seo and H. Kim, "Hidden Indicator Based PIN-Entry Method Using Audio Signals," Journal of information and communication convergence engineering, vol. 15, no. 2, pp. 91-96, June 2017.   DOI
4 H. Seo, Z. Liu, J. Kim, and H. Kim, "Personal identification number entry for Google glass," Computers & Electrical Engineering, vol. 63, pp.160-167, May 2017.   DOI
5 J. Ranjan and K. Whitehouse, "Automatic authentication of smartphone touch interactions using smartwatch," In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, pp. 361-364, 2016.
6 H. Seo, Z. Liu, G. Seo, T. Park, J. Choi, and H. Kim, "Open sesame! hacking the password," In International Workshop on Information Security Applications, Jeju, pp. 215-226, 2015.
7 D. Buschek, F. Hartmann, E. Von Zezschwitz, A. De Luca, and F. Alt, "Snapapp: Reducing authentication overhead with a time-constrained fast unlock option," In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, pp. 3736-3747, 2016.
8 Y. Zhong, B. Bhargava, Y. Lu, P. Angin, "A Computational Dynamic Trust Model for User Authorization," Asia-pacific Journal of Convergent Research Interchange, HSST, vol. 1, no. 4, pp. 1-6, Dec. 2015.