Mobile Phone's Wi-Fi Presence for Continuous Implicit Secondary Deauthentication
Author(s): Adrian Dabrowski, Edgar Weippl

Date: December 5 2016
Publication: 11th International Conference on Passwords (Passwords16 Bochum)
Source: Currently no known Internet copy of paper.

Abstract or Summary:
Authentication is widely considered a core challenge in usable security. We propose an implicit method for secondary (de-)authentication based on device presence. Our method does not require system modifications on the users' side, e.g., by installing an additional app, and is therefore cheap and easy to deploy. Having removed the burden of developing and maintaining apps in the fast proceeding field of mobile phone operating systems is a great advantage. Furthermore, our method solves the problem of accurate de-authentication as it automatically logs out the user if the device is not in reach of the WiFi network.

Our method works by monitoring WiFi activity of users' phones regardless if connected to a WiFi network or not. We facilitate passive monitoring on the radio layer (e.g., probing requests and power save mode keep-alive management packets) and the network layer (DHCP and ARP snooping). Additionally, we employ active probing using ARP ping and IPv6 Link Layer Neighbor Discovery. We describe how to implement a monitoring and probing device in a constant time and space manner (e.g., by using a Bloom filter ring) optimal for embedded systems. Note: Video of presentation:

Do you have additional information to contribute regarding this research paper? If so, please email with the details.

<-- Back to Authentication Research Paper Index

[Home] [About Us] [News] [Research]

Copyright © 2016