2018 IEEE Security and Privacy Workshops (SPW) 2018
DOI: 10.1109/spw.2018.00042
|View full text |Cite
|
Sign up to set email alerts
|

WACA: Wearable-Assisted Continuous Authentication

Abstract: One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. In this paper, we introduce a usable and reliable method called Wearable-Assisted Continuous Authentication (WACA). … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 38 publications
0
21
0
Order By: Relevance
“…In contrast, herein we consider web authentication schemes, thus focusing on user-to-web and device-to-web authentication. As such, user-to-device (e.g., [14] [15]) and similarly other paradigms such as device-to-device (e.g., [16] [17]), are out of the scope of our work.…”
Section: Background and Contextmentioning
confidence: 99%
“…In contrast, herein we consider web authentication schemes, thus focusing on user-to-web and device-to-web authentication. As such, user-to-device (e.g., [14] [15]) and similarly other paradigms such as device-to-device (e.g., [16] [17]), are out of the scope of our work.…”
Section: Background and Contextmentioning
confidence: 99%
“…Acar et al [38] used smartwatches with keystroke dynamics for continuous authentication. Musale et al [25] proposed a continuous authentication system based on Motorola 360 Sport by using accelerometer and gyroscope features.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to IvoriWatch, several schemes leverage motion sensors embedded on a wrist-wearable for security purposes. Schemes most relevant to our work are ZEBRA [13] and WACA [1]. ZEBRA correlates the sequence of interactions observed on the host machine with the sequence of interactions predicted based on wrist motions captured by the wrist-wearable to enable a continuous re-authentication of the user.…”
Section: Related Workmentioning
confidence: 99%