SlideShare a Scribd company logo
1 of 8
Download to read offline
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Understanding Smartphone Sensor and App Data for
Enhancing the Security of Secret Questions
Abstract :
Many web applications provide secondary authentication methods, i.e., secret
questions (or password recovery questions), to reset the account password when a
user’s login fails. However, the answers to many such secret questions can be
easily guessed by an acquaintance or exposed to a stranger that has access to public
online tools (e.g., online social networks); moreover, a user may forget her/his
answers long after creating the secret questions. Today’s prevalence of
smartphones has granted us new opportunities to observe and understand how the
personal data collected by smartphone sensors and apps can help create
personalized secret questions without violating the users’ privacy concerns. In this
paper, we present a Secret-Question based Authentication system, called “Secret-
QA”, that creates a set of secret questions on basic of people’s smartphone usage.
We develop a prototype on Android smartphones, and evaluate the security of the
secret questions by asking the acquaintance/stranger who participate in our user
study to guess the answers with and without the help of online tools; meanwhile,
we observe the questions’ reliability by asking participants to answer their own
questions. Our experimental results reveal that the secret questions related to
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
motion sensors, calendar, app installment, and part of legacy app usage history
(e.g., phone calls) have the best memorability for users as well as the highest
robustness to attacks.
Existing system:
Existing research has revealed that such blank-filling questions created upon the
user’s long-term history may lead to poor security and reliability. The “security” of
a secret question depends on the validity of a hidden assumption: A user’s long-
term personal history/information is only known by the user himself. However, this
assumption does not hold when a user’s personal information can be acquired by
an acquaintance, or by a stranger with access to public user profiles. An
acquaintance of a user can easily infer the answers to the user’s secret questions
(e.g., “name of pet”). Moreover, a stranger can figure out the answers leaked from
public user profiles in online social networks or search engine results (e.g., “the
hospital your youngest child was born in”)
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Disadvantage :
The “reliability” of a secret question is its memorability—the required effort or
difficulty of memorizing the correct answer. Without a careful choice of a blank-
filling secret question, a user may be declined to log in, because he cannot
remember the exact answer that he provided, or he may misspell the input that
requires the perfect literally-matching to the correct answerthey are displayed on
the smartphone screens
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
 Above Diagram represent System Architecture Secret QA
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 5
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Proposed system:
In this paper, we present a Secret-Question based Authentication system, called
“Secret-QA”, taking advantage of the data of smartphone sensors and apps without
violating the user privacy. Meanwhile, we develop a prototype of Secret-QA, and
conduct an experimental user study involving 88 volunteers to evaluate the
reliability and security of the set of secret question created in the system.
Specifically, We design a user authentication system with a set of secret questions
created based on the data of users’ short-term smartphone usage. We evaluated the
reliability and security of the three types of secret questions (blank-filling,
true/false, and multiple-choice) with a comprehensive experiment involving 88
participants. The experimental results show that the combination of multiple
lightweight true-false and multiple choice questions required less input effort with
the same strength provided by blank-filling questions. We evaluate the usability of
the system, and find that the Secret-QA system is easier to use than those existing
authentication system with secret questions based on users’ long-term historic data.
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 6
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Advantages:
The secret questions related to motion sensors, calendar, app installment, and part of
legacy apps (call) have the best performance in terms of memorability and the attack
resilience, which outperform the conventional secret-question based approaches that
are created based on a user’s long-term history/information.
Conclusion :
We proposed SBVLC, utilizing a fully duplex smartphone VLC channel based on 2D
barcode. On top of the duplex VLC channel, we further propose three secure
communication schemes. All SBVLC schemes are evaluated through extensive
experiments on Android smartphones, and the results show that our system
achieves high level security and NFC-comparable throughput. The system can be
used for private information sharing, secure device pairing and secure mobile
payment, etc. To our best knowledge, this work is the first one that formally
defines and studies the security of a smartphone VLC system. It serves as a
milestone for further development in secure VLC systems for smartphones. We
will also extend our system to support other mobile and portable devices, e.g.
laptops and tablets.
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 7
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Hardware Specification :
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech
 Ram : 512 Mb.
 MOBILE : ANDROID
Software Specification :
 Operating system : Windows 7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Android Studio
The Master of IEEE Projects
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 8
IEEE Master
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Reference :
[1] R. Reeder and S. Schechter, “When the password doesn’t work: Secondary
authentication for websites,” S & P., IEEE, vol. 9, no. 2, pp. 43–49, March 2011.
[2] M. Zviran and W. J. Haga, “User authentication by cognitive passwords: an
empirical assessment,” in Information Technology, 1990.’Next Decade in
information Technology’, Proceedings of the 5th Jerusalem Conference on (Cat.
No. 90TH0326-9). IEEE, 1990, pp. 137–144.
[3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective computer security:
Cognitive and associative passwords,” in Computer-Human Interaction, 1996.
Proceedings., Sixth Australian Conference on. IEEE, 1996, pp. 304–305.
[4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret. measuring the
security and reliability of authentication via secret questions,” in S & P., IEEE. IEEE,
2009, pp. 375–390.
[5] S. Schechter, C. Herley, and M. Mitzenmacher, “Popularity is everything: A
new approach to protecting passwords from statistical-guessing attacks,” in
USENIX Hot topics in security, 2010, pp. 1–8.

More Related Content

Viewers also liked

Smartphone security
Smartphone securitySmartphone security
Smartphone securityMuthu Kumar
 
Empowerment 4
Empowerment 4Empowerment 4
Empowerment 4Sam Hager
 
Working Principals of Various Sensors
Working Principals of Various SensorsWorking Principals of Various Sensors
Working Principals of Various SensorsMuhammad Irtiza
 
Smartphone sensor and gesture
Smartphone sensor and gestureSmartphone sensor and gesture
Smartphone sensor and gestureBhavya5800
 
Sensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsSensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsJeffrey Funk
 
Smart materials
Smart materialsSmart materials
Smart materialsJobin Joy
 
Smart materials.. smart ppt
Smart materials.. smart pptSmart materials.. smart ppt
Smart materials.. smart pptdeepika46
 
Smartphones powerpoint presentation
Smartphones powerpoint presentationSmartphones powerpoint presentation
Smartphones powerpoint presentationnhla4
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of SmartphonesPulkit Syal
 
Sic an advanced semicondctor material for power devices
Sic an advanced semicondctor material for power devicesSic an advanced semicondctor material for power devices
Sic an advanced semicondctor material for power deviceseSAT Publishing House
 
Wave 4 - Power to the People | UM | Social Media Tracker
Wave 4  - Power to the People | UM | Social Media TrackerWave 4  - Power to the People | UM | Social Media Tracker
Wave 4 - Power to the People | UM | Social Media TrackerUM Wave
 
Approximate shortest distance computing
Approximate shortest distance computingApproximate shortest distance computing
Approximate shortest distance computingLeMeniz Infotech
 
Hybrid modulated extended secondary universal current fed zvs converter for w...
Hybrid modulated extended secondary universal current fed zvs converter for w...Hybrid modulated extended secondary universal current fed zvs converter for w...
Hybrid modulated extended secondary universal current fed zvs converter for w...LeMeniz Infotech
 

Viewers also liked (16)

Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Empowerment 4
Empowerment 4Empowerment 4
Empowerment 4
 
Working Principals of Various Sensors
Working Principals of Various SensorsWorking Principals of Various Sensors
Working Principals of Various Sensors
 
Smartphone sensor and gesture
Smartphone sensor and gestureSmartphone sensor and gesture
Smartphone sensor and gesture
 
Advanced material
Advanced materialAdvanced material
Advanced material
 
Sensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsSensors, MEMS, Internet of Things
Sensors, MEMS, Internet of Things
 
Smart materials
Smart materialsSmart materials
Smart materials
 
Smart materials.. smart ppt
Smart materials.. smart pptSmart materials.. smart ppt
Smart materials.. smart ppt
 
Smartphones powerpoint presentation
Smartphones powerpoint presentationSmartphones powerpoint presentation
Smartphones powerpoint presentation
 
Ppt on World Of Smartphones
Ppt on World Of SmartphonesPpt on World Of Smartphones
Ppt on World Of Smartphones
 
Sic an advanced semicondctor material for power devices
Sic an advanced semicondctor material for power devicesSic an advanced semicondctor material for power devices
Sic an advanced semicondctor material for power devices
 
Enp 181 Magazin
Enp 181 MagazinEnp 181 Magazin
Enp 181 Magazin
 
8391 11758-1-sm
8391 11758-1-sm8391 11758-1-sm
8391 11758-1-sm
 
Wave 4 - Power to the People | UM | Social Media Tracker
Wave 4  - Power to the People | UM | Social Media TrackerWave 4  - Power to the People | UM | Social Media Tracker
Wave 4 - Power to the People | UM | Social Media Tracker
 
Approximate shortest distance computing
Approximate shortest distance computingApproximate shortest distance computing
Approximate shortest distance computing
 
Hybrid modulated extended secondary universal current fed zvs converter for w...
Hybrid modulated extended secondary universal current fed zvs converter for w...Hybrid modulated extended secondary universal current fed zvs converter for w...
Hybrid modulated extended secondary universal current fed zvs converter for w...
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android appsLeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Recently uploaded (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Understanding smartphone sensor and app data for enhancing the security of secret question

  • 1. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions Abstract : Many web applications provide secondary authentication methods, i.e., secret questions (or password recovery questions), to reset the account password when a user’s login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools (e.g., online social networks); moreover, a user may forget her/his answers long after creating the secret questions. Today’s prevalence of smartphones has granted us new opportunities to observe and understand how the personal data collected by smartphone sensors and apps can help create personalized secret questions without violating the users’ privacy concerns. In this paper, we present a Secret-Question based Authentication system, called “Secret- QA”, that creates a set of secret questions on basic of people’s smartphone usage. We develop a prototype on Android smartphones, and evaluate the security of the secret questions by asking the acquaintance/stranger who participate in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the questions’ reliability by asking participants to answer their own questions. Our experimental results reveal that the secret questions related to
  • 2. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com motion sensors, calendar, app installment, and part of legacy app usage history (e.g., phone calls) have the best memorability for users as well as the highest robustness to attacks. Existing system: Existing research has revealed that such blank-filling questions created upon the user’s long-term history may lead to poor security and reliability. The “security” of a secret question depends on the validity of a hidden assumption: A user’s long- term personal history/information is only known by the user himself. However, this assumption does not hold when a user’s personal information can be acquired by an acquaintance, or by a stranger with access to public user profiles. An acquaintance of a user can easily infer the answers to the user’s secret questions (e.g., “name of pet”). Moreover, a stranger can figure out the answers leaked from public user profiles in online social networks or search engine results (e.g., “the hospital your youngest child was born in”)
  • 3. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Disadvantage : The “reliability” of a secret question is its memorability—the required effort or difficulty of memorizing the correct answer. Without a careful choice of a blank- filling secret question, a user may be declined to log in, because he cannot remember the exact answer that he provided, or he may misspell the input that requires the perfect literally-matching to the correct answerthey are displayed on the smartphone screens
  • 4. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com  Above Diagram represent System Architecture Secret QA
  • 5. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 5 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Proposed system: In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, taking advantage of the data of smartphone sensors and apps without violating the user privacy. Meanwhile, we develop a prototype of Secret-QA, and conduct an experimental user study involving 88 volunteers to evaluate the reliability and security of the set of secret question created in the system. Specifically, We design a user authentication system with a set of secret questions created based on the data of users’ short-term smartphone usage. We evaluated the reliability and security of the three types of secret questions (blank-filling, true/false, and multiple-choice) with a comprehensive experiment involving 88 participants. The experimental results show that the combination of multiple lightweight true-false and multiple choice questions required less input effort with the same strength provided by blank-filling questions. We evaluate the usability of the system, and find that the Secret-QA system is easier to use than those existing authentication system with secret questions based on users’ long-term historic data.
  • 6. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 6 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Advantages: The secret questions related to motion sensors, calendar, app installment, and part of legacy apps (call) have the best performance in terms of memorability and the attack resilience, which outperform the conventional secret-question based approaches that are created based on a user’s long-term history/information. Conclusion : We proposed SBVLC, utilizing a fully duplex smartphone VLC channel based on 2D barcode. On top of the duplex VLC channel, we further propose three secure communication schemes. All SBVLC schemes are evaluated through extensive experiments on Android smartphones, and the results show that our system achieves high level security and NFC-comparable throughput. The system can be used for private information sharing, secure device pairing and secure mobile payment, etc. To our best knowledge, this work is the first one that formally defines and studies the security of a smartphone VLC system. It serves as a milestone for further development in secure VLC systems for smartphones. We will also extend our system to support other mobile and portable devices, e.g. laptops and tablets.
  • 7. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 7 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Hardware Specification :  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech  Ram : 512 Mb.  MOBILE : ANDROID Software Specification :  Operating system : Windows 7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Android Studio
  • 8. The Master of IEEE Projects Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 8 IEEE Master 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Reference : [1] R. Reeder and S. Schechter, “When the password doesn’t work: Secondary authentication for websites,” S & P., IEEE, vol. 9, no. 2, pp. 43–49, March 2011. [2] M. Zviran and W. J. Haga, “User authentication by cognitive passwords: an empirical assessment,” in Information Technology, 1990.’Next Decade in information Technology’, Proceedings of the 5th Jerusalem Conference on (Cat. No. 90TH0326-9). IEEE, 1990, pp. 137–144. [3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective computer security: Cognitive and associative passwords,” in Computer-Human Interaction, 1996. Proceedings., Sixth Australian Conference on. IEEE, 1996, pp. 304–305. [4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret. measuring the security and reliability of authentication via secret questions,” in S & P., IEEE. IEEE, 2009, pp. 375–390. [5] S. Schechter, C. Herley, and M. Mitzenmacher, “Popularity is everything: A new approach to protecting passwords from statistical-guessing attacks,” in USENIX Hot topics in security, 2010, pp. 1–8.