Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns

Rainhard Findling, Rene Mayrhofer

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

4 Citations (Scopus)

Abstract

Users usually authenticate to mobile devices before using them (e.g. PIN, password), but devices do not do the same to users. Revealing the authentication secret to a non-authenticated device potentially enables attackers to obtain the secret, by replacing the device with an identical-looking malicious device. The revealed authentication secret could be transmitted to the attackers immediately, who then conveniently authenticate to the real device. Addressing this attack scenario, we analyze different approaches towards mobile device-to-user (D2U) authentication, for which we provide an overview of advantages/drawbacks, potential risks and device authentication data bandwidth estimations. We further analyze vibration as one D2U feedback channel that is unobtrusive and hard to eavesdrop, including a user study to estimate vibration pattern recognition using a setup of ~7 bits per second (b/s). Study findings indicate that users are able to distinguish vibration patterns with median correctness of 97.5% (without taking training effects into account) - which indicates that vibration could act as authentication feedback channel and should be investigated further in future research.
Original languageEnglish
Title of host publicationMUM 2015 - Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia
EditorsEnrico Rukzio, Michael Roland, Rene Mayrhofer, Clemens Holzmann, Jonna Hakkila
PublisherACM Press
Pages131-135
Number of pages5
ISBN (Electronic)9781450336055
DOIs
Publication statusPublished - 30 Nov 2015
Event14th International Conference on Mobile and Ubiquitous Multimedia (MUM 2015) - Linz, Austria
Duration: 30 Nov 20152 Dec 2015
http://www.mum-conf.org/2015/

Publication series

NameACM International Conference Proceeding Series
Volume30-November-2015

Conference

Conference14th International Conference on Mobile and Ubiquitous Multimedia (MUM 2015)
CountryAustria
CityLinz
Period30.11.201502.12.2015
Internet address

Keywords

  • Phishing hardware
  • mobile authentication
  • vibration
  • feedback
  • Vibration
  • Feedback
  • Mobile authentication

Fingerprint Dive into the research topics of 'Towards Device-to-User Authentication: Protecting Against Phishing Hardware by Ensuring Mobile Device Authenticity using Vibration Patterns'. Together they form a unique fingerprint.

Cite this