Sistematização do Contexto como Fator de Autenticação de Usuários de Dispositivos Móveis
Abstract
The need to protect mobile devices from unauthorized access is growing. On the other hand, conventional mechanisms currently used for authentication represent an obstacle that users need to overcome every time they want to use their devices. This problem is exacerbated in mobile devices because of their differences in the use dynamics. In this scenario, many authors propose solutions based on implicit, transparent and continuous authentication focused mainly on the use of biometric factors. Unlike other studies, we propose the use of context as a user authentication factor together with a systematization of this strategy on mobile devices. In order to achieve this goal our proposal makes use of the context acquisition framework LoCCAM and Hidden Markov Models (HMM) techniques.
References
COSTA, Luciano R.; OBELHEIRO, Rafael R.; FRAGA, Joni S. (2006) Introdução à Biometria. Livro texto dos Minicursos do VI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg2006), v. 1, p. 103-151. SBC: Porto Alegre.
COUTAZ, J. et al. (2005) Context is key. Communications of the ACM, v. 48, n. 3, p. 49-53. ACM.
CRAWFORD, Heather (2014) Adventures in Authentication – Position Paper. In: Symposium on Usable Privacy and Security (SOUPS).
DEY, A.K. Understanding and using context. Personal and ubiquitous computing, v. 5, n. 1, p. 4-7, 2001.
HAYASHI, Eiji et al. (2013) CASA: Context-Aware Scalable Authentication. In: Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS’13), p. 3. ACM.
JAKOBSSON, Markus et al. (2009) Implicit Authentication for Mobile Devices. In: Proceedings of the 4th USENIX Conference on Hot Topics in Security. USENIX Association.
MAIA, M.E.F. et al. (2013) LOCCAM – Loosely Coupled Context Acquisition Middleware. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, p. 534-541. ACM.
RABINER, L. R.; JUANG, Biing-Hwang. (1986) An Introduction to Hidden Markov Models. ASSP Magazine, v. 3, n. 1, p. 4-16. IEEE.
VIANA, W. C. (2010) Mobilité et sensibilité au contexte pour la gestion de documments multimédias personnels: CoMMediA. Tese (Doutorado) — Université Joseph-Fourier – Grenoble. Disponível em: <http://hal.archives-ouvertes.fr/tel00499550/>.
WIEDENBECK, Susan et al. (2006) Design and Evaluation of a Shoulder-Surfing Resistant Graphical Password Scheme. In: Proceedings of the Working Conference on Advanced Visual Interfaces, p. 177-184. ACM.
