A Context-Aware Authentication Approach Based on Behavioral Definitions

Mobile devices are becoming mandatory equipment in modern life and are increasingly being used as devices in various distributed computing environments to allow users to be connected to their companies and institutions anytime and anywhere. However, connections are usually based on traditional authentication processes, which do not consider the environmental characteristics, application’s requirements and information provided by sensors present in the pervasive space. A context-based approach can represent a useful alternative for circumventing threats in a mobile computing scenario. In this paper, it is presented an approach that adopts user authentication on mobile devices based on a spatio-temporal context. This behavior is modeled trough explicit and implicit profiles, which define events and tasks that compound the user activity. This approach presents a more dynamic and reliable policy for authenticating users. In addition, experimental results indicate a relevant efficiency of proposal using a space-time permutation model to detect authentication anomalies.

[1]  B. Sathish Babu,et al.  A Dynamic Authentication Scheme for Mobile Transactions , 2009, Int. J. Netw. Secur..

[2]  Gerard Salton,et al.  Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer , 1989 .

[3]  Lorna Uden,et al.  Activity theory for designing mobile learning , 2007, Int. J. Mob. Learn. Organisation.

[4]  Sandeep K. Shukla,et al.  A cross-layer approach for power-performance optimization in distributed mobile systems , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[5]  Tom Carey,et al.  Human-computer interaction , 1994 .

[6]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[7]  Massoud Pedram,et al.  Extending the lifetime of a network of battery-powered mobile devices by remote processing: a Markovian decision-based approach , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).

[8]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[9]  Jadwiga Indulska,et al.  A survey of context modelling and reasoning techniques , 2010, Pervasive Mob. Comput..

[10]  Michael Anthony Bauer,et al.  Toward Reducing Query Response Time for Mobile Emergency Assistance Applications through a Ontology-based Semantic Cache Model , 2009, IKE.

[11]  Diane J. Cook,et al.  Human Activity Recognition and Pattern Discovery , 2010, IEEE Pervasive Computing.

[12]  Ignas G. Niemegeers,et al.  Predicting mobility events on personal devices , 2010, Pervasive Mob. Comput..

[13]  Anders Kofod-Petersen,et al.  Using Activity Theory to Model Context Awareness: A Qualitative Case Study , 2006, FLAIRS.

[14]  Gleneesha M. Johnson Towards shrink-wrapped security: A taxonomy of security-relevant context , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[15]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[16]  Siméon-Denis Poisson Recherches sur la probabilité des jugements en matière criminelle et en matiére civile, précédées des règles générales du calcul des probabilités , 1837 .