Conference item
STASH: Securing transparent authentication schemes using prover-side proximity verification
- Abstract:
- Transparent authentication (TA) schemes are those in which a user's prover device authenticates him to a verifier without requiring explicit user interaction. By doing so, those schemes promise high usability and security simultaneously. Most TA implementations rely on the received signal strength as an indicator of the proximity of a user device (prover). However, such implicit proximity verification is not secure against an adversary who can relay messages over a larger distance. In this paper, we propose a novel approach for thwarting relay attacks on TA schemes: the prover permits access to authentication credentials only if it can confirm that it is near the verifier. We present STASH, a system for relay-resilient transparent authentication in which the prover does proximity verification by comparing its approach trajectory towards the intended verifier, with known authorized reference trajectories. Trajectories are measured using low-cost sensors commonly available on personal devices. By analyzing empirical data, collected using a STASH prototype, we demonstrate the security of STASH against a class of adversaries and its ease-of-use. STASH is efficient and can be easily integrated to complement existing TA schemes.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 705.8KB, Terms of use)
-
- Publisher copy:
- 10.1109/SAHCN.2017.7964922
Authors
- Publisher:
- Institute for Electrical and Electronics Engineers
- Host title:
- 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON 2017)
- Journal:
- 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON 2017) More from this journal
- Publication date:
- 2017-07-03
- Acceptance date:
- 2017-03-14
- DOI:
- Keywords:
- Pubs id:
-
pubs:653463
- UUID:
-
uuid:b43290b4-66ea-42b1-b055-cefc3538dd5f
- Local pid:
-
pubs:653463
- Source identifiers:
-
653463
- Deposit date:
-
2018-04-30
Terms of use
- Copyright holder:
- Institute for Electrical and Electronics Engineers
- Copyright date:
- 2017
- Notes:
- ©2017 IEEE. This is the accepted manuscript version of the article. The final version is available online from Institute for Electrical and Electronics Engineers at: http://dx.doi.org/10.1109/SAHCN.2017.7964922
If you are the owner of this record, you can report an update to it here: Report update to this record