Implicit Authentication based on Mobile Devices
Authentication, if designed properly, prevents many notorious attacks such as identity theft and is the cornerstone of a secure cyberspace. The most widely used authentication method is still password-based using human-memorizable passwords which are trivial to attack despite their quality. Besides, it quickly becomes frustrating and overwhelming to people as more and more applications and services are designed with username and password. The fourth-factor authentication, i.e., based on what you do, is a form of implicit authentication that does not require explicit user action. It is the least explored authentication technique but is receiving more attention from the research community and industry due to the convenience, user-friendliness, lower cost, and better security it offers for practical deployment. In this seminar, we will cover the research done at the University of Tennessee along this line.
Jinyuan Stella Sun received her PhD degree from University of Florida in 2010. Since graduation, she has been an assistant professor in the Department of Electrical Engineering and Computer Science at the University of Tennessee, Knoxville. Her research interests include data security, system security, network security, user privacy, information privacy and location privacy for mobile phone systems, mobile social networks, cloud computing, smart grid, mHealth, and wireless networks.