confidence level without the Aura concept is almost
equal to zero. Yet, if she decides to use it, she has
already gained on confidence level which increases to
69% when using the Aura solution by just being at her
parents home which is declared as a trusted hotspot
and by relying on the confidence on her smartphone
over the time spent using it. In terms of privacy,
the trust party, in order to authorize authentication,
collects information to know whether a device is in a
specific hotspot or not, but it is not allowed to know
the content of data. In our case, the trust party has
no right to have access to the geolocation data. It
receives only the Biocodes BG because all collected
data are protected by the Biohashing algorithm as
mentioned in the section 3.2. So, the trust party can
be informed of Alice’s presence in a trusted hotspot
without knowing exactly where she is. Noting that
the mono-device transparent authentication privacy
is respected as well, and we can refer to this work
(Guiga et al., 2020) for more details.
5 CONCLUSION
We proposed in this paper a multidevices
transparent authentication solution, called Privacy
Authentication Aura, that improves the confidence
level authentication comparing to a mono-device
solution and ensures data privacy protection. A
higher confidence is provided by the Aura when
devices are located at the same trusted hotspot and
it can be transferred from a device to another. It is
true that in our process, the confidence decreases
over time, but to keep transparency, it cannot be
decreased abruptly, and, in fact, this can lead to
intrusion attacks. Therefore, we aim to improve our
process so the user can be alerted when one of her
devices is not detected in the Aura but still have a
high confidence. The user can decide to decrease the
confidence of a device if it is not located in the same
Aura. This process is classical to detect payment
frauds (as for example, detecting a withdrawal of
money in a foreign country), we plan to improve the
proposed solution with a negative impact of the Aura
on the authentication confidence level.
REFERENCES
Cha, B.-R., Lee, S.-H., Park, S.-B., Ji, G.-K. L. Y.-K.,
et al. (2015). Design of micro-payment to strengthen
security by 2 factor authentication with mobile &
wearable devices. Advanced Science and Technology
Letters, 109(7):28–32.
Gonzalez-Manzano, L., de Fuentes, J. M., and Orfila,
A. (2015). Access control for the cloud based
on multi-device authentication. In 2015 IEEE
Trustcom/BigDataSE/ISPA, volume 1, pages 856–
863. IEEE.
Guiga, T., Rosenberger, C., and Schwartzmann, J.-J. (2020).
When my behavior enhances my smartphone security.
In 2020 International Conference on Cyberworlds
(CW), pages 280–284. IEEE.
Hajny, J., Dzurenda, P., and Malina, L. (2016). Multi-device
authentication using wearables and iot. In SECRYPT,
pages 483–488.
Hocking, C. G., Furnell, S. M., Clarke, N. L., and
Reynolds, P. L. (2011). Authentication aura-a
distributed approach to user authentication. Journal of
Information Assurance and Security, 6(2):149–156.
Jin, A. T. B., Ling, D. N. C., and Goh, A. (2004).
Biohashing: two factor authentication featuring
fingerprint data and tokenised random number.
Pattern recognition, 37(11):2245–2255.
Juniper (2020). Juniper research press releases,
”iot connections to reach 83 billion by 2024,
driven by maturing industrial use cases”. https:
//www.juniperresearch.com/press/press-releases/
iot-connections-to-reach-83-billion-by-2024-driven.
[Online; accessed 27-January-2021].
Patel, V. M., Ratha, N. K., and Chellappa, R. (2015).
Cancelable biometrics: A review. IEEE Signal
Processing Magazine, 32(5):54–65.
Pillai, J. K., Patel, V. M., Chellappa, R., and Ratha,
N. K. (2010). Sectored random projections
for cancelable iris biometrics. In 2010 IEEE
International Conference on Acoustics, Speech and
Signal Processing, pages 1838–1841. IEEE.
Ratha, N. K., Connell, J. H., and Bolle, R. M. (2001).
Enhancing security and privacy in biometrics-based
authentication systems. IBM systems Journal,
40(3):614–634.
Rathgeb, C., Breitinger, F., Busch, C., and Baier, H. (2014).
On application of bloom filters to iris biometrics. IET
Biometrics, 3(4):207–218.
Riva, O., Qin, C., Strauss, K., and Lymberopoulos, D.
(2012). Progressive authentication: deciding when to
authenticate on mobile phones. In 21st {USENIX}
Security Symposium ({USENIX} Security 12), pages
301–316.
Rosenberger, C. (2018). Evaluation of biometric template
protection schemes based on a transformation. In
ICISSP, pages 216–224.
Teoh, A., Ngo, D., and Goh, A. (2004). Biohashing: two
factor authentication featuring fingerprint data and
tokenised random number. Pattern recognition, 40.
Xu, W. (2015). Mobile applications based on smart
wearable devices. In Proceedings of the 13th ACM
Conference on Embedded Networked Sensor Systems,
pages 505–506.
Zhang, J., Wang, Z., Yang, Z., and Zhang, Q. (2017).
Proximity based iot device authentication. In IEEE
INFOCOM 2017-IEEE Conference on Computer
Communications, pages 1–9. IEEE.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
746