Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication

H. Truong, Xiang Gao, B. Shrestha, Nitesh Saxena, N. Asokan, P. Nurmi
{"title":"Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication","authors":"H. Truong, Xiang Gao, B. Shrestha, Nitesh Saxena, N. Asokan, P. Nurmi","doi":"10.1109/PerCom.2014.6813957","DOIUrl":null,"url":null,"abstract":"Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user's personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks. In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev-Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and Audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.","PeriodicalId":263520,"journal":{"name":"2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"74","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PerCom.2014.6813957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 74

Abstract

Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user's personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks. In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev-Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and Audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.
零交互认证中不同传感器抗中继攻击的比较与融合
零交互认证(Zero-Interaction Authentication, ZIA)是指不与用户进行任何交互,直接向验证者(终端)验证用户身份的方法。目前部署的ZIA解决方案主要基于终端通过在短距离无线通信通道上运行身份验证协议来检测用户个人设备的接近程度或安全令牌。不幸的是,这种简单的方法非常容易受到低成本和实用的中继攻击,这完全抵消了ZIA的可用性优势。使用车载传感器收集的上下文信息来检测用户和验证者的共同存在是最近提出的一种抵御中继攻击的机制。在本文中,我们系统地研究了相对于标准Dolev-Yao对手的共存在检测的不同传感器模式的性能。首先,使用在现实的日常设置中运行的通用数据收集框架,我们比较了四种常用的传感器模式(WiFi,蓝牙,GPS和音频)在抵抗ZIA中继攻击方面的性能,并发现WiFi比其他方式更好。其次,我们表明,与任何单一模式相比,融合多种模式提高了对ZIA中继攻击的弹性,同时保持了高水平的可用性。第三,我们激发了对更强大的对抗模型的需求,以表征可能损害上下文感知本身完整性的攻击者。我们表明,在如此强大的攻击者存在的情况下,每个单独的传感器模式提供非常低的安全性。积极地说,如果攻击者不能同时危及多个模态,则使用多个传感器模态可提高对此类攻击者的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信