Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.2.301

User Authentication Mechanism using Smartphone  

Jeong, Pil-seong (HEART MEDIA Co., Ltd.)
Cho, Yang-hyun (Division of Computer Science, Sahmyook University)
Abstract
With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.
Keywords
Hidden Factor; Multi Factor; Security Factor; Smartphone; Smart Device;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 K. Y. Jin, S. H. Choi, J. W. Seo, and Y. G. Kim, "An Approach to Systems with Multi-Factor Method," Journal of the Korea Academia-Industrial cooperation Society, vol. 13, no. 2, pp. 842-848, Feb. 2012.   DOI
2 J. Y. Lee, H. S. Shim, K. S. Han, Y. L. Choi, and J. B. Kim, "A Study on the Models of Internal system users Authentication considering Multi Factors," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 9, pp. 2044-2055, Sept. 2015.   DOI
3 C. S. Kim, S. B. Youn, and M. K. Lee, "Shoulder-Surfing Resistant Password Input Method for Mobile Environment," Journal of the Korea Institute of Information Security and Cryptology, vol. 20, no. 3, pp. 93-104, June 2010.
4 S. S. Ji, "The Improved-Scheme of Two Factor Authentication using SMS," Journal of the Korea Industrial Information Systems Research, vol. 17, no. 6, pp. 25-30, Dec. 2012.   DOI
5 M. K. Choi, T. C. Kwan, and D. H. Lee, "Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone," Journal of The Korea Institute of Information Security and Cryptology, vol. 23, no. 1, pp. 19-32, Feb. 2013.   DOI
6 "Standardization trend of non-face authentication technology based on telebio recognition," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 4, pp. 43-50, Oct. 2015.
7 MAS, Internet banking and technology risk management guidelines, Version 3.0, Monetary Authority of Singapore, June 2008.
8 J. S. Seo, and J. S. Moon, "A Study on User Authentication with Smartphone Accelerometer Sensor," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1477-1484, Dec. 2015.   DOI
9 H. Ketabdar, K. A. Yuksel, A. Jahnbekarn, M. Roshandel, and D. Skirop, "MagiSign: User Identifaction /Authetication Based on 3D Around Device Magnetic Signatures," The Fourth International Conference on Mobile Ubiqutous Computing, Systms, Services and Technologies, pp. 31-34, 2010.
10 A. Bianchi, I. Oakley, V. Kostakos, and D. S. Kwon, "The Phone Lock: Audio and Haptic Shoulder-Surfing Resistant PIN Entry Methods for Mobile Devices," TEI'11 Proceedings of the fifth international conference on Tangible, embedded, and embodied interaction, pp. 197- 200, Jan. 2011.