Recent Trends in User Authentication – A Survey
2019, IEEE Access
https://doi.org/10.1109/ACCESS.2019.2932400Abstract
Recent advancements in technology have led to profusion of personal computing devices, such as smart phone, tablet, watch, glasses, and many more. This has contributed to the realization of a digital world where important daily tasks can be performed over the Internet from any place and at any time and using any device. At the same time, advances in pervasive computing technologies have brought to fruition the concept of smart spaces that target the automated provision of customized services to the inhabitants effortlessly. User authentication, i.e., a procedure to verify the identity of the user, is essential in the digital world so as to protect the user's personal data stored online (e.g., online bank accounts) and on personal devices (e.g., smart phones) and to also enable customized services in smart spaces (e.g., adjusting room temperature and so on). Recently, traditional authentication mechanisms (e.g., passwords or fingerprints) have been repeatedly shown to be vulnerable to subversion. Researchers thus have proposed numerous new mechanisms to authenticate the users in the aforementioned scenarios. This paper presents an overview of these novel systems, so as to guide the future research efforts in these domains.
References (98)
- 2018). Importance of User Authentication in Network Security-Seqrite. [Online]. Available: https://blogs.seqrite.com/
- Craig Mathias. (2014). Why Mobile User Authentication is More Important than Ever. [Online]. Available: https://searchmobilecomputing. techtarget.com/
- C. Shi, J. Liu, H. Liu, and Y. Chen, ''Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT,'' in Proc. Mobi- Hoc, 2017, Art. no. 5.
- N. L. Clarke and S. M. Furnell, ''Authentication of users on mobile telephones-A survey of attitudes and practices,'' Comput. Secur., vol. 24, no. 7, pp. 519-527, 2005.
- A. Vance. (2010). If Your Password is 12345, Just Make it HackMe. [Online]. Available: http://www.nytimes.com/
- H. League. (2018). What is Brute Force Attack? [Online]. Available: https://medium.com/
- Mahesh. (2019). How Hackers Hack Your Accounts and Passwords and Ways to Avoid Being Compromised. [Online]. Available: https://www. shoutmeloud.com/
- M. Li, Y. Meng, J. Liu, H. Zhu, X. Liang, Y. Liu, and N. Ruan, ''When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals,'' in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), New York, NY, USA, 2016, pp. 1068-1079. [Online]. Available: http://doi.acm.org/10.1145/2976749.2978397
- A. Kelly, ''Cracking passwords using keyboard acoustics and language modeling,'' M.S. thesis, School Inform., Univ. Edinburgh, Edinburgh, U.K., 2010.
- A. Ng. (2019). Massive Breach Leaks 773 Million Email Addresses, 21 Million Passwords. [Online]. Available: https://www.cnet.com/
- N. Lord. (2018). Uncovering Password Habits: Are Users' Pass- word Security Habits Improving? Infographic. [Online]. Available: https://digitalguardian.com/
- M. Tullock. (2018). Do Password Managers Keep You Secure-Or Give You a False Sense of Security? [Online]. Available: http://techgenix.com/
- D. Tapellini. (2014). Smart Phone Thefts Rose to 3.1 Million in 2013: Industry Solution Falls Short, While Legislative Efforts to Curb Theft Continue. [Online]. Available: http://www.consumerreports.org
- H. Khan, U. Hengartner, and D. Vogel, ''Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying,'' in Proc. SOUPS, 2015, pp. 225-239.
- S. Egelman, S. Jain, R. S. Portnoff, K. Liao, S. Consolvo, and D. Wagner, ''Are you ready to lock?'' in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 750-761.
- M. Harbach, E. von Zezschwitz, A. Fichtner, A. De Luca, and M. Smith, ''It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception,'' in Proc. Symp. Usable Privacy Secur. (SOUPS), 2014, pp. 213-230.
- A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith, ''Smudge attacks on smartphone touch screens,'' in Proc. 4th USENIX Conf., 2010, pp. 1-10.
- P. Cheng, I. E. Bagci, U. Roedig, and J. Yan, ''SonarSnoop: Active acous- tic side-channel attacks,'' 2018, arXiv:1808.10250. [Online]. Available: https://arxiv.org/abs/1808.10250
- Fingerprints are Not Fit for Secure Device Locking, Secur. Res. Labs, Berlin, Germany, 2019. [Online]. Available: https://srlabs.de/bites/ spoofing-fingerprints/
- L. H. Newman. (2016). Hackers Trick Facial-Recognition Logins with Pho- tos From Facebook What Else? [Online]. Available: https://www.wired. com/2016/08/
- R. Brandom. (2017). Two-Factor Authentication is a Mess. [Online]. Avail- able: https://www.theverge.com/
- N. Gunson, D. Marshall, H. Morton, and M. Jack, ''User perceptions of security and usability of single-factor and two-factor authentica- tion in automated telephone banking,'' Comput. Secur., vol. 30, no. 4, pp. 208-220, Jun. 2011.
- V. Patel, R. Chellappa, D. Chandra, and B. Barbello, ''Continuous user authentication on mobile devices: Recent progress and remaining chal- lenges,'' IEEE Signal Process. Mag., vol. 33, no. 4, pp. 49-61, Jul. 2016.
- A. Hang, A. De Luca, M. Smith, M. Richter, and H. Hussman, ''Where have you been? Using location-based security questions for fallback authentication,'' in Proc. Symp. Usable Privacy Secur. (SOUPS), 2015, pp. 169-183.
- J. Thorpe, B. MacRae, and A. Salehi-Abari, ''Usability and security evalua- tion of GeoPass: A geographic location-password scheme,'' in Proc. Symp. Usable Privacy Secur. (SOUPS), 2013, Art. no. 14.
- N. Shone, C. Dobbins, W. Hurst, and Q. Shi, ''Digital memories based mobile user authentication for IoT,'' in Proc. IEEE Int. Conf. Comput. Inf. Technol.; Ubiquitous Comput. Commun.; Dependable, Autonomic Secure Comput.; Pervasive Intell. Comput., Oct. 2015, pp. 1796-1802.
- Y. Albayram, M. M. H. Khan, A. Bamis, S. Kentros, N. Nguyen, and R. Jiang, ''A location-based authentication system leveraging smart- phones,'' in Proc. IEEE 15th Int. Conf. Mobile Data Manage., Jun. 2014, pp. 83-88.
- P. Gupta, T. K. Wee, N. Ramasubbu, D. Lo, D. Gao, and R. K. Balan, ''HuMan: Creating memorable fingerprints of mobile users,'' in Proc. IEEE Int. Conf. Pervasive Comput. Commun. Workshops, Mar. 2012, pp. 479-482.
- S. Das, E. Hayashi, and J. I. Hong, ''Exploring capturable everyday memory for autobiographical authentication,'' in Proc. UbiComp, 2013, pp. 211-220.
- S. K. Dandapat, S. Pradhan, B. Mitra, R. R. Choudhury, and N. Ganguly, ''ActivPass: Your daily activity is your password,'' in Proc. ACM Conf. Hum. Factors Comput., 2015, pp. 2325-2334.
- H. Sun, K. Wang, X. Li, N. Qin, and Z. Chen, ''PassApp: My app is my password!'' in Proc. 17th Int. Conf. Hum.-Comput. Interact. Mobile Devices Services (MobileHCI), Copenhagen, Denmark, no. 10, 2015, pp. 306-315. doi: 10.1145/2785830.2785880.
- H. Hang, A. De Luca, and H. Hussmann, ''I know what you did last week! Do You?: Dynamic security questions for fallback authentication on smartphones,'' in Proc. CHI, 2015, pp. 1383-1392.
- J. Naftulin. (2016). Research Shows We Touch Our Cell Phones 2,617 Times Per Day. [Online]. Available: https://www.businessinsider.com.au/
- M. Dammak, O. R. M. Boudia, M. A. Messous, S. M. Senouci, and C. Gransart, ''Token-based lightweight authentication to secure IoT net- works,'' in Proc. 16th IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), Jan. 2018, pp. 1-4.
- J. Liu, Y. Xiao, and C. L. P. Chen, ''Authentication and access control in the Internet of Things,'' in Proc. 32nd Int. Conf. Distrib. Comput. Syst. Workshops, Jun. 2012, pp. 588-592.
- Kwikset. (2019). No More Keys. [Online]. Available: https://www.kwikset. com/electronics/homeowners/keylessentry.aspx
- Yale. (2019). Yale Assure Lock. [Online]. Available: https://www.yalelock. com.au/en/yale/yale-au/yale-products/secure-connect/yale-assure-digital- lock/
- M. Sandström, ''Liveness detection in fingerprint recognition systems,'' M.S. thesis, Dept. Syst. Eng., Linköpings Univ., Linköping, Sweden, 2004.
- T. van der Putte and J. Keuning, ''Biometrical fingerprint recognition: Don't get your fingers burned,'' in Proc. 4th Working Conf. Smart Card Res. Adv. Appl. Smart Card Res. Adv. Appl., Sep. 2000, pp. 289-303.
- M. Sepasian, C. Mares, and W. Balachandran, ''Liveness and spoofing in fingerprint identification: Issues and challenges,'' in Proc. Int. Conf. Comput. Eng. Appl., 2010, pp. 150-158.
- C. Yuan, X. Sun, and Q. M. J. Wu, ''Difference co-occurrence matrix using BP neural network for fingerprint liveness detection,'' Soft Comput., vol. 23, no. 13, pp. 5157-5169, Jul. 2019.
- Z. Xia, C. Yuan, R. Lv, X. Sun, N. N. Xiong, and Y.-Q. Shi, ''A novel weber local binary descriptor for fingerprint liveness detection,'' IEEE Trans. Syst., Man, Cybern., Syst., to be published.
- W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, ''Security and accuracy of fingerprint-based biometrics: A review,'' Symmetry, vol. 11, no. 2, p. 141, 2019.
- M. Staff and G. Fleishman. (2017). Face ID on the iPhone X: Everything You Need to Know About Apple's Facial Recognition. [Online]. Available: https://www.macworld.com
- T. Brewster. (2018). We Broke Into a Bunch of Android Phones with a 3D-Printed Head. [Online]. Available: https://www.forbes.com/
- 2017). Bkav's New Mask Beats Face ID, 'Twin Way': Severity Level Raised, Do Not Use Face ID in Business Transactions. [Online]. Available: http://www.bkav.com
- Samsung. (2016). Iris Recognition on Galaxy S8. [Online]. Available: https://www.samsung.com/au/iris/
- D. Goodin. (2016). Breaking the Iris Scanner Locking Samsung's Galaxy S8 is Laughably Easy. [Online]. Available: https://arstechnica.com/
- Stacy. (2017). Is the Galaxy S8 Hazardous to Your Eyesight? Samsung Users Claim Iris Scanner is Causing Eye Discomfort. [Online]. Available: https://www.dailymail.co.uk/
- H. Zhong, S. S. Kanhere, and C. T. Chou, ''VeinDeep: Smartphone unlock using vein patterns,'' in Proc. PerCom, Mar. 2017, pp. 2-10.
- J. Cox. (2018). Hackers Make a Fake Hand to Beat Vein Authentication. [Online]. Available: https://www.vice.com/
- J. Chauhan, Y. Hu, S. Seneviratne, A. Misra, A. Seneviratne, and Y. Lee, ''BreathPrint: Breathing acoustics-based user authentication,'' in Proc. MobiSys, 2017, pp. 278-291.
- NEC. (2018). Biometric Authentication Based on the Acoustic Character- istics of the Ears. [Online]. Available: https://www.nec.com
- A. F. P. Negara, E. Kodirov, D.-J. Choi, G.-S. Lee, M. F. A. Abdullah, and S. Sayeed, ''Implicit authentication based on ear shape biometrics using smartphone camera during a call,'' in Proc. IEEE Int. Conf. Syst., Man, Cybern. (SMC), Oct. 2012, pp. 2272-2276.
- X. Zhang, L. Yao, S. S. Kanhere, Y. Liu, T. Gu, and K. Chen, ''MindID: Person identification from brain waves through attention-based recurrent neural network,'' Proc. ACM Interact. Mob. Wearable Ubiquitous Tech- nol., vol. 2, no. 3, pp. 149:1-149:23, Sep. 2018. [Online]. Available: http://doi.acm.org/10.1145/3264959
- I. Martinovic, K. Rasmussen, M. Roeschlin, and G. Tsudik, ''Authenti- cation using pulse-response biometrics,'' Commun. ACM, vol. 60, no. 2, pp. 108-115, Jan. 2017. [Online]. Available: http://doi.acm.org/10.1145/ 3023359
- N. Zheng, K. Bai, H. Huang, and H. Wang, ''You are how you touch: User verification on smartphones via tapping behaviors,'' in Proc. IEEE 22nd Int. Conf. Netw. Protocols, Oct. 2014, pp. 211-221.
- Y. Chen, J. Sun, R. Zhang, and Y. Zhang, ''Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices,'' in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Apr./May 2015, pp. 2686-2694.
- J. Sun, R. Zhang, J. Zhang, and Y. Zhang, ''Touchin: Sightless two- factor authentication on multi-touch mobile devices,'' in Proc. IEEE Conf. Commun. Netw. Secur., Oct. 2014, pp. 436-444.
- T. Feng, X. Zhao, N. DeSalvo, Z. Gao, X. Wang, and W. Shi, ''Security after login: Identity change detection on smartphones using sensor fusion,'' in Proc. IEEE Int. Symp. Technol. Homeland Secur. (HST), Apr. 2015, pp. 1-6.
- C. Bo, L. Zhang, X.-Y. Li, Q. Huang, and Y. Wang, ''Silentsense: Silent user identification via touch and movement behavioral biometrics,'' in Proc. MobiCom, 2013, pp. 187-190.
- N. Neverova, C. Wolf, G. Lacey, L. Fridman, D. Chandra, B. Barbello, and G. Taylor, ''Learning human identity from motion patterns,'' Apr. 2016, arXiv:1511.03908. [Online]. Available: https://arxiv.org/abs/1511.03908
- L. Fridman, S. Weber, R. Greenstadt, and M. Kam, ''Active authentication on mobile devices via stylometry, application usage, Web browsing, and GPS location,'' IEEE Syst. J., vol. 11, no. 2, pp. 513-521, Jun. 2016.
- R. Kumar, V. V. Phoha, and R. Raina, ''Authenticating users through their arm movement patterns,'' Mar. 2016, arXiv:1603.02211. [Online]. Available: https://arxiv.org/abs/1603.02211
- J. Yang, Y. Li, and M. Xie, ''MotionAuth: Motion-based authentica- tion for wrist worn smart devices,'' in Proc. IEEE PerCom, Mar. 2015, pp. 550-555.
- S. Li, A. Ashok, Y. Zhang, C. Xu, J. Lindqvist, and M. Gruteser, ''Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns,'' in Proc. IEEE PerCom, Mar. 2016, pp. 1-9.
- T. Alpcan, S. Kesici, D. Bicher, M. K. Mihçak, C. Bauckhage, and S. Çamtepe, ''A lightweight biometric signature scheme for user authenti- cation over networks,'' in Proc. SecureComm, 2008, Art. no. 33.
- S. W. Shah and S. S. Kanhere, ''Wi-sign: Device-free second factor user authentication,'' in Proc. MobiQuitous, 2018, pp. 135-144.
- S. W. Shah and S. S. Kanhere, ''Wi-access: Second factor user authen- tication leveraging WiFi signals,'' in Proc. PerCom Workshops, 2018, pp. 330-335.
- L. Middleton, A. A. Buss, A. Bazin, and M. S. Nixon, ''A floor sensor sys- tem for gait recognition,'' in Proc. 4th IEEE Workshop Autom. Identificat. Adv. Technol. (AutoID), Oct. 2005, pp. 171-176.
- J. Cheng, M. Sundholm, B. Zhou, M. Kreil, and P. Lukowicz, ''Rec- ognizing subtle user activities and person identity with cheap resistive pressure sensing carpet,'' in Proc. Int. Conf. Intell. Environ., Jun./Jul. 2014, pp. 148-153.
- H. Kim, I. Kim, and J. Kim, ''Designing the smart foot mat and its applications: As a user identification sensor for smart home scenarios,'' Adv. Sci. Technol. Lett., vol. 87, pp. 1-5, Apr. 2015.
- A. S. Guinea, A. Boytsov, L. Mouline, and Y. Le Traon, ''Continuous identification in smart environments using wrist-worn inertial sensors,'' in Proc. MobiQuitous, 2018, pp. 87-96.
- X. Wang, A. M. Bernardos, P. Tarrío, and J. R. Casar, ''A gesture-enabled method for natural identification in smart spaces,'' in Proc. 16th Int. Conf. Inf. Fusion, Jul. 2013, pp. 827-834.
- J. Zhang, B. Wei, W. Hu, and S. S. Kanhere, ''WiFi-ID: Human identifica- tion using WiFi signal,'' in Proc. Int. Conf. Distrib. Comput. Sensor Syst., May 2016, pp. 75-82.
- W. Wang, A. X. Liu, and M. Shahzad, ''Gait recognition using WiFi signals,'' in Proc. UbiComp, 2016, pp. 363-373.
- Y. Zeng, P. H. Pathak, and P. Mohapatra, ''WiWho: WiFi-based person identification in smart spaces,'' in Proc. ISPN, 2016, Art. no. 4.
- S. Davidson, D. Smith, C. Yang, and S. C. Cheah, ''Smartwatch user identification as a mean of authentication,'' Univ. California San Diego, San Diego, CA, USA, 2016.
- F. Zhang, A. Kondor, and S. Muftic, ''Location-based authentication and authorization using smart phones,'' in Proc. IEEE 11th Int. Conf. Trust, Secur. Privacy Comput. Commun., Jun. 2012, pp. 1285-1292.
- U. A. Abdurrahman, M. Kaiiali, and J. Muhammad, ''A new mobile- based multi-factor authentication scheme using pre-shared number, GPS location and time stamp,'' in Proc. Int. Conf. Electron., Comput. Comput., Nov. 2013, pp. 293-296.
- N. Karapanos, C. Marforio, C. Soriente, and S. Čapkun, ''Sound-proof: Usable two-factor authentication based on ambient sound,'' in Proc. 24th USENIX Secur. Symp., 2015, pp. 483-498.
- J. Zhang, X. Tan, X. Wang, A. Yan, and Z. Qin, ''T2FA: Transpar- ent two-factor authentication,'' IEEE Access, vol. 6, pp. 32677-32686, 2018.
- S. W. Shah and S. S. Kanhere, ''Wi-Auth: WiFi based second factor user authentication,'' in Proc. MobiQuitous, 2017, pp. 393-402.
- RSA. (2019). RSA SecureID. [Online]. Available: https:www.rsa.com
- Yubico. (2019). YubiKeys. [Online]. Available: https:www.yubico.com
- Kwikset. (2019).Touch-to-Open Smart Lock. [Online]. Available: https://www.kwikset.com/kevo/default
- Aug. 2019). Your Smart Home Starts at the Front Door. [Online]. Avail- able: https://august.com/
- M. Wollerton. (2016). Here's What Happened when Someone Hacked the August Smart Lock. [Online]. Available: https://august.com/
- B. M. Wolf and L. Gil. (2019). How to Enable Auto Unlock on Your Mac and Apple Watch. [Online]. Available: https://www.imore.com/auto- unlock
- S. Klee, ''Understanding the apple auto unlock protocol,'' B.S. thesis, Dept. Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany, 2017.
- Motiv. (2018). Motiv Ring Now Provides New, Easy-to-Use Secu- rity Features to Protect Your Online Identity.. [Online]. Available: https://mymotiv.com/online-security/
- Duo Security. (2019). Duo Push. [Online]. Available: https://duo.com/ product/trusted-users/two-factor-authentication/authentication- methods/duo-push
- Encap Security. (2019). Encap Security. [Online]. Available: https://www. encapsecurity.com/
- Auth0. (2017). Two Factor Authentication Using Biometrics. [Online]. Available: https://auth0.com/blog/two-factor-authentication-using- biometrics/
- Biosig-ID. (2018). Biometric Multi-Factor Authentication Smart Pass- word. [Online]. Available: https://www.biosig-id.com
- V. M. Patel, R. Gopalan, R. Li, and R. Chellappa, ''Visual domain adap- tation: A survey of recent advances,'' IEEE Signal Process. Mag., vol. 32, no. 3, pp. 53-69, May 2015.
- SYED W. SHAH received the M.S. degree in elec- trical and electronics engineering from the Univer- sity of Bradford, U.K. He is currently pursuing the Ph.D. degree from the University of New South Wales (UNSW), Sydney, Australia. His research interests include pervasive/ubiquitous computing, user authentication/identification, the Internet of Things, and signal processing.
- SALIL S. KANHERE received the M.S. and Ph.D. degrees in electrical engineering from Drexel Uni- versity, Philadelphia, PA, USA. He is currently a Professor with the School of Computer Science and Engineering, UNSW, Sydney, Australia. He is also a Conjoint Researcher with CSIRO Data61. He has published over 200 peer-reviewed articles and delivered over 30 tutorials and keynote talks on these topics. His research has been featured on ABC News Australia, Forbes, the IEEE Spectrum, Wired, ZDNET, Computer World, Medium, MIT Technology Review, and other media outlets. His research interests include the Internet of Things, pervasive computing, blockchain, crowdsourcing, data analytics, privacy, and security. He is a Senior Member of the ACM. He is a recipient of the Alexander von Humboldt Research Fellowship. He regularly serves on the organizing committee of a number of the IEEE and ACM international conferences. He is on the Editorial Board of Elsevier's Pervasive and Mobile Computing and Computer Communications and serves as an ACM Distin- guished Speaker.