2019
DOI: 10.1002/cpe.5549
|View full text |Cite
|
Sign up to set email alerts
|

Securing PIN‐based authentication in smartwatches with just two gestures

Abstract: Summary Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to develop sophisticated applications that make daily life easier and more convenient for consumers. The services provided include applications for mobile payment, ticketing, identification, access control, etc. While this makes modern smartwatches very powerful devices, it also makes them very attractive targets for attackers. Indeed, PINs and Pattern Lock have been widely used in smartwatches for user authentication. How… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 46 publications
0
15
0
1
Order By: Relevance
“…In [60], [63], authors proposed a PIN-based authentication method for smartwatches that embeds a form of physical CAPTCHA. This mechanism uses the same principle behind CAPPCHA [56].…”
Section: Captchas For Liveliness Detection In Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [60], [63], authors proposed a PIN-based authentication method for smartwatches that embeds a form of physical CAPTCHA. This mechanism uses the same principle behind CAPPCHA [56].…”
Section: Captchas For Liveliness Detection In Authentication Methodsmentioning
confidence: 99%
“…For instance, behavioralbased CAPTCHA schemes strongly rely on mouse dynamics or on touch-and-tap dynamics, hence they require form-factor specialization. Sensor-based CAPTCHA schemes require sensors that are available only in tablets, smartphones and smartwatches (e.g., [60], [62]), hence they are currently unavailable on a large portion of users' devices and further study to find potential surrogates of sensors data, possibly relying on trusted hardware, on desktops and laptops are needed.…”
Section: Compatibility With All Devicesmentioning
confidence: 99%
“…5m/8m), an adversary can also collects enough information to implement the cracking procedure. In addition, the increasing types of wearable device [20,23,36] make this attack more convenient and unperceivable.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, an attacker is able to remotely steal the banking data stored in an NFC bank card or an NFC smartphone, without the knowledge of the client [6]. In addition, the user's password or the Personal Identification Number (PIN) can be stolen through various attacks such as: spyware [7], shoulder-surfing [8], side channel [9], brute force [10], replay [11], smudge [12], camera recording [13], video recording [14] and multiple registration [15]. Indeed, in order to deposit or withdraw money using an NFC smartphone in front of an ATM, the user must authenticate himself.…”
Section: Introductionmentioning
confidence: 99%