2014 IEEE 15th International Conference on Mobile Data Management 2014
DOI: 10.1109/mdm.2014.16
|View full text |Cite
|
Sign up to set email alerts
|

A Location-Based Authentication System Leveraging Smartphones

Abstract: This paper investigates a location-based authentication system where authentication questions are generated based on users' locations tracked by smartphones. More specifically, the system builds a location profile for a user based on periodically logged Wi-Fi access point beacons over time, and leverages this location profile to generate authentication questions. To evaluate the various aspects of this location-based authentication approach, we deployed the application on users' smartphones and conducted a rea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…While these and our own exploratory studies [25,21,22] present interesting results, no comprehensive study has been done so far that looked into the strengths and weaknesses of such systems considering different kinds of users, question types, and answer selection schemes (e.g., open-ended vs. multiple choice). Towards that, our work presented in this paper complements these prior efforts that investigated the challenge of designing dynamic security questions using users' smartphone usage behavior data for fallback authentication, and extends prior efforts in several ways as follows.…”
Section: Related Workmentioning
confidence: 97%
See 2 more Smart Citations
“…While these and our own exploratory studies [25,21,22] present interesting results, no comprehensive study has been done so far that looked into the strengths and weaknesses of such systems considering different kinds of users, question types, and answer selection schemes (e.g., open-ended vs. multiple choice). Towards that, our work presented in this paper complements these prior efforts that investigated the challenge of designing dynamic security questions using users' smartphone usage behavior data for fallback authentication, and extends prior efforts in several ways as follows.…”
Section: Related Workmentioning
confidence: 97%
“…To address the limitations of static challenge question based schemes, several new approaches have been investigated where challenge questions are not predetermined and are dynamically generated on the fly based on user's recent activities such as online browsing history [15,16], Facebook activity [17], electronic personal history (e.g., personal calendar data) [18,19], email history [20], and users' recent location history [21,22]. Among works that looked into leveraging smartphone usage data and behavior data, Das et al [9] proposed to generate authentication questions from users' day-today activities captured by their smartphones.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To preserve this location data, we can implement LOCATEme over LBS authentication [1]. The device's dummy proof along with nearby devices' proofs, allows the system to calculate the score whether or not to trust the user's location data.…”
Section: International Journal For Research In Applied Science and Engimentioning
confidence: 99%
“…By analyzing frequently visited locations of users in the past 6 months, for example, the validation of the current access location can be judged and a digital signature can be provided based on the result . Similarly, in Reference, the BSSID (Wi‐Fi MAC address) and RSSI (recovered Wi‐Fi signal strength) are recorded while users log into Wi‐Fi access points. This location profile is leveraged to generate an authentication questionnaire.…”
Section: Introductionmentioning
confidence: 99%