Comparing and Fusing Different Sensor Modalities for Relay Attack Resistance in Zero-Interaction Authentication Conference Paper uri icon

abstract

  • Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user's personal device, or a security token, by running an authentication protocol over a short-range wireless communication channel. Unfortunately, this simple approach is highly vulnerable to low-cost and practical relay attacks which completely offset the usability benefits of ZIA. The use of contextual information, gathered via on-board sensors, to detect the co-presence of the user and the verifier is a recently proposed mechanism to resist relay attacks. In this paper, we systematically investigate the performance of different sensor modalities for co-presence detection with respect to a standard Dolev-Yao adversary. First, using a common data collection framework run in realistic everyday settings, we compare the performance of four commonly available sensor modalities (WiFi, Bluetooth, GPS, and Audio) in resisting ZIA relay attacks, and find that WiFi is better than the rest. Second, we show that, compared to any single modality, fusing multiple modalities improves resilience against ZIA relay attacks while retaining a high level of usability. Third, we motivate the need for a stronger adversarial model to characterize an attacker who can compromise the integrity of context sensing itself. We show that in the presence of such a powerful attacker, each individual sensor modality offers very low security. Positively, the use of multiple sensor modalities improves security against such an attacker if the attacker cannot compromise multiple modalities simultaneously.

name of conference

  • 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)

published proceedings

  • 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)

altmetric score

  • 6

author list (cited authors)

  • Truong, H., Gao, X., Shrestha, B., Saxena, N., Asokan, N., & Nurmi, P.

citation count

  • 44

complete list of authors

  • Truong, Hien Thi Thu||Gao, Xiang||Shrestha, Babins||Saxena, Nitesh||Asokan, N||Nurmi, Petteri

publication date

  • January 2014