Title: ContextAware Authentication Framework
1Context-Aware Authentication Framework
Diwakar Goel, Eisha Kher, Shriya Joag, Veda
Mujumdar, Martin Griss, Anind K. Dey
CyLab Mobility Research Center
Mobility Research Center Carnegie Mellon Silicon
Valley
1
2Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
Context-Aware Authentication Framework
3Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
October 26, 2009
4Context-Awareness
- Context
- information about the situation of an entity,
e.g., location, identity, time, activity - Context-Aware Systems
- use context to provide relevant information
and/or services to the user - enhance the behavior of any application by
informing it of the context of use
October 26, 2009
5Our solution framework
- Authentication algorithm
- User scans QR codes using camera-phones, requests
access - Context contains authentication information
- Access may be granted based on policies
- Contextual cues used
- Location (coordinates, using Wi-Fi positioning)
- Roles (faculty, student, staff, admin)
- Time of day
October 26, 2009
6Context-Aware Authentication
- Enhances usability
- Password replaced by gesture
- Enhances Robustness
- Adaptive instead of static passwords
- Scalable
- Ubiquitous use of mobile phones
- Extensible
- Multiple contextual cues, e.g., time, location,
roles
October 26, 2009
7Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
October 26, 2009
8A scenario
October 26, 2009
9Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
October 26, 2009
10The Architecture
October 26, 2009
11The Architecture
Dynamic -Linked to server -On tablets, kiosks,
other screens
Static -Inexpensive -On Paper
October 26, 2009
12The Architecture
Logs -Authentication attempts -Time -Result -Con
text info
Maintains -QR code info -Location info -Expiry
time
October 26, 2009
13The Architecture
Stores -User-specific info -Session
token -Calendar id
October 26, 2009
14Example
Step 2 Extra authentication Optional extra layer
of security
Step 3 Context-based Access
Step 1 Scan QR code
October 26, 2009
15Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
October 26, 2009
16Threats and Attacks Mitigated
- Replication of displayed code
- Time varying, location varying QR codes
- Cloning/ theft of user device
- Session tokens, line-of-sight property
- Brute force/guessing attack
- Dynamically generated codes
- Faking/manipulating context information
- Weighted context cues, peer verification
- Sniffing attack
October 26, 2009
17Why QR codes?
- Can be read fast
- Easy to generate
- Can be displayed anywhere on screens/print outs
- Can be read by nearly all camera equipped phones
- Robust against sniffing attacks
- Line-of-sight property
October 26, 2009
18Outline
- Background
- A Scenario
- The Architecture
- Threats and Attacks Mitigated
- Conclusion
October 26, 2009
19Conclusion
- Role-based and location-based access control
- Leveraged users context
- Used light-weight tagging
- Advantages
- Simple, inexpensive, scalable, extensible
- Centralized control over authentication sites
- Smarter and robust authentication
- Future work
- Adding other contextual cues, user profiling
October 26, 2009
20Acknowledgments
- Thanks to
- Co-authors for their contribution
- CyLab, ARO and Nokia for their grants
- You for patient listening!
October 26, 2009
Context-Aware Authentication Framework
October 26, 2009
21Context-Aware Authentication Framework
Diwakar Goel, Eisha Kher, Shriya Joag, Veda
Mujumdar, Martin Griss, Anind K. Dey
CyLab Mobility Research Center
Mobility Research Center Carnegie Mellon Silicon
Valley
21