Visible to the public Killing the password, part 1: An exploratory analysis of walking signatures

TitleKilling the password, part 1: An exploratory analysis of walking signatures
Publication TypeConference Paper
Year of Publication2017
AuthorsHutton, W. J., Dang, Z., Cui, C.
Conference Name2017 Computing Conference
Keywordsauthentication, Global Positioning System, Human Behavior, Identity management, identity management systems, Legged locomotion, Meteorology, mobile applications, Network security, pubcrawl, Resiliency, Scalability, Sensors, Statistical Learning
AbstractFor over 50 years, the password has been a frequently used, yet relatively ineffective security mechanism for user authentication. The ubiquitous smartphone is a compact suite of sensors, computation, and network connectivity that corporations are beginning to embrace under BYOD (bring your own device). In this paper, we hypothesize that each of us has a unique "walking signature" that a smartphone can recognize and use to provide passive, continuous authentication. This paper describes the exploratory data analysis of a small, cross-sectional, empirical study of users' walking signatures as observed by a smartphone. We then describe an identity management system that could use a walking signature as a means to passively and continuously authenticate a user and manage complex passwords to improve security.
DOI10.1109/SAI.2017.8252188
Citation Keyhutton_killing_2017