IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v11y2019i1p279-d195651.html
   My bibliography  Save this article

Implicit Secondary Authentication for Sustainable SMS Authentication

Author

Listed:
  • Gwonsang Ryu

    (Department of Convergence Science, Graduate School of Kongju National University, Gongju 32588, Korea)

  • Seung-Hyun Kim

    (Information Security Research Division, Electronics and Telecommunications Research Institute (ETRI), Daejeon 34129, Korea)

  • Daeseon Choi

    (Department of Medical Information, Kongju National University, Gongju 32588, Korea)

Abstract

Short message service (SMS) is the most widely adopted multi-factor authentication method for consumer-facing accounts. However, SMS authentication is susceptible to vulnerabilities such as man-in-the-middle attack, smishing, and device theft. This study proposes implicit authentication based on behavioral pattern of users when they check an SMS verification code and environmental information of user proximity to detect device theft. User behavioral pattern is collected by using the accelerometer and gyroscope of a smart device such as a smartphone and smart watch. User environmental information is collected using device fingerprint, wireless access point, Bluetooth, and global positioning system information. To evaluate the performance of the proposed scheme, we perform experiments using a total of 1320 behavioral and environmental data collected from 22 participants. The scheme achieves an average equal error rate of 6.27% when using both behavioral and environmental data collected from only a smartphone. Moreover, it achieves an average equal error rate of 0% when using both behavioral and environmental data collected from a smartphone and smart watch. Therefore, the proposed scheme can be employed for more secure SMS authentication.

Suggested Citation

  • Gwonsang Ryu & Seung-Hyun Kim & Daeseon Choi, 2019. "Implicit Secondary Authentication for Sustainable SMS Authentication," Sustainability, MDPI, vol. 11(1), pages 1-14, January.
  • Handle: RePEc:gam:jsusta:v:11:y:2019:i:1:p:279-:d:195651
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/11/1/279/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/11/1/279/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:11:y:2019:i:1:p:279-:d:195651. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.