Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.3.167

User Authentication Method using Vibration Cue on Smartphone  

Lee, Jong-Hyeok ((주)롯데정보통신 보안컨설팅팀 보안컨설팅담당)
Choi, Ok-Kyung (아주대학교 지식정보보안학과)
Kim, Kang-Seok (아주대학교 지식정보보안학과)
Yeh, Hong-Jin (아주대학교 지식정보보안학과)
Abstract
Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.
Keywords
Keystroke; User Authentication; Information Security; Vibration Cue; Shoulder Surfing Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 방송통신위원회, 한국인터넷진흥원, "스마트 폰 이용 실태 조사 (II)", pp.22, 2010년 12월.
2 삼성경제연구소, "모바일 빅뱅이 촉발하는 기업경영의 변화", Issue Paper, 2010년 10월.
3 강동호, "스마트 폰 보안 위협 및 대응 기술", 전자통신동향분석 제 25권 제 3호, 2010년 6월.
4 전명근, "생체정보 이용과 프라이버시 보호", 한국정보보호학회지 제 15권 제 6호, 2005년 12월.
5 Hopkins, R, "An Introduction to Biometrics and Large Scale Civilian Identification," International Review of Law Computer and Technology, Vol.13, No.3, pp.337-363, 1999.   DOI   ScienceOn
6 황성섭 "키스트로크 다이나믹스 분석을 이용한 모바일 사용자 인증", 한국경영과학회 2006년 추계학술대회논문집, pp.652- 655, 2006.11
7 김천식 "이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술", 전자공학회논문지-CI 제 45권 제 5호 (통권 제 323호), pp.25-31, 2008년 9월.
8 Cho, S. and Hwang, S. "Artificial rhythms and cues for keystroke dynamics based authentication", Lecture Notes in Computer Science (LNCS), Vol.3832, pp.626-632, 2005.
9 Hwang, S., Lee, H. and Cho, S. "Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication", Expert Systems with Applications, Vol.36, pp.10649-10656, 2009.   DOI   ScienceOn
10 Coventry, L., A. De Angeli, and G.Johnson, "Usability and Biometric Verification at the ATM Interface," SIGCHI conference on Human factors in computing systems, pp.153-160, 2003.
11 나성욱, "스마트 폰과 모바일 오피스의 보안 이슈 및 대응 전략", CIO Report Vol.26, 한국정보화진흥원, 2010. 10.