2GesturePIN: Securing PIN-Based Authentication on Smartwatches

Meriem Guerar, Luca Verderame, M. Migliardi, A. Merlo
{"title":"2GesturePIN: Securing PIN-Based Authentication on Smartwatches","authors":"Meriem Guerar, Luca Verderame, M. Migliardi, A. Merlo","doi":"10.1109/WETICE.2019.00074","DOIUrl":null,"url":null,"abstract":"Smartwatches offer new capabilities to develop sophisticated applications that make daily life easier and more convenient for consumers and are becoming increasingly ubiquitous. The kind of services these devices are capable to provide include applications for mobile payment, ticketing, identification, access control, etc. While this makes modern smartwatches very powerful devices, it also makes them very attractive targets for attackers. PINs and Pattern Lock have been widely used in smartwatches for user authentication, however, those types of passwords are not robust against various forms of attacks, such as side channel, phishing, smudge, shoulder surfing, and videorecording attacks. In this work, we propose 2GesturePIN, a new authentication method that allows users to authenticate securely to their smartwatches and sensitive services through solely two gestures. It leverages the rotating bezel or the crown which are the most intuitive channels to interact with a smartwatch. 2GesturePIN enhances the resilience of the regular PIN to common attacks while maintaining a high level of usability.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.2019.00074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Smartwatches offer new capabilities to develop sophisticated applications that make daily life easier and more convenient for consumers and are becoming increasingly ubiquitous. The kind of services these devices are capable to provide include applications for mobile payment, ticketing, identification, access control, etc. While this makes modern smartwatches very powerful devices, it also makes them very attractive targets for attackers. PINs and Pattern Lock have been widely used in smartwatches for user authentication, however, those types of passwords are not robust against various forms of attacks, such as side channel, phishing, smudge, shoulder surfing, and videorecording attacks. In this work, we propose 2GesturePIN, a new authentication method that allows users to authenticate securely to their smartwatches and sensitive services through solely two gestures. It leverages the rotating bezel or the crown which are the most intuitive channels to interact with a smartwatch. 2GesturePIN enhances the resilience of the regular PIN to common attacks while maintaining a high level of usability.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
2 . gesturepin:保护智能手表上基于pin的身份验证
智能手表提供了开发复杂应用程序的新功能,使消费者的日常生活变得更容易、更方便,而且正变得越来越普遍。这些设备能够提供的服务类型包括移动支付、票务、身份识别、访问控制等应用程序。虽然这使现代智能手表成为非常强大的设备,但也使它们成为攻击者非常有吸引力的目标。pin和模式锁已广泛用于智能手表的用户身份验证,然而,这些类型的密码对于各种形式的攻击并不强大,例如侧信道,网络钓鱼,涂抹,肩部冲浪和视频录制攻击。在这项工作中,我们提出了2GesturePIN,这是一种新的身份验证方法,允许用户仅通过两个手势就可以安全地验证他们的智能手表和敏感服务。它利用旋转的表圈或表冠,这是与智能手表互动最直观的渠道。2gestrepin增强了常规PIN对常见攻击的弹性,同时保持了高水平的可用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Real-Time SCADA Attack Detection by Means of Formal Methods Architecture of Anomaly Detection Module for the Security Operations Center Privacy Preserving Intrusion Detection Via Homomorphic Encryption A Deep Learning Framework to Predict Rating for Cold Start Item Using Item Metadata Mining Developer's Behavior from Web-Based IDE Logs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1