Smartphones and other highly mobile yet sophisticated technologies are rapidly spreading through society and increasingly finding their way into pockets and handbags. As reliance upon these intensifies and familiarity grows, human nature dictates that more and more personal details and information is now to be found upon such devices. The need to secure and protect this valuable and desirable information is becoming ever more prevalent. Building upon previous work which proposed a novel approach to user authentication, an Authentication Aura, this paper investigates the latent security potential contained in surrounding devices in everyday life. An experiment has been undertaken to ascertain the technological infrastructure, devices and inert objects that surround individuals to establish if these items might be significant. The results suggest that inert possessions may offer a surprisingly large potential with some being in close proximity to experimental subjects for over 45% of the entire period. With other graphical analysis illustrating the consistency of presence, this work suggests that everyday possessions and devices can be leveraged to augment traditional approaches and even in certain circumstances, during device activation remove the need to authenticate.
[1]
Steven Furnell,et al.
A distributed and cooperative user authentication framework
,
2010,
2010 Sixth International Conference on Information Assurance and Security.
[2]
L. O'Gorman,et al.
Comparing passwords, tokens, and biometrics for user authentication
,
2003,
Proceedings of the IEEE.
[3]
C T Dinardo,et al.
Computers and security
,
1986
.
[4]
Steven Furnell,et al.
Authentication of users on mobile telephones - A survey of attitudes and practices
,
2005,
Comput. Secur..
[5]
Eirik Albrechtsen,et al.
A qualitative study of users' view on information security
,
2007,
Comput. Secur..
[6]
Joshua Cook,et al.
Improving password security and memorability to protect personal and organizational information
,
2007,
Int. J. Hum. Comput. Stud..