SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1054
Smartphone Sensor Based Security Questions and Location
Ms. Ghodekar P.V1, Ms. Mogal B. S2, Ms. Kasar S.R3, Ms. Deshmukh S. R4, Prof. Mr. Thosar D.S5
1,2,3,4B.E Student, computer engineering, SVIT Nashik.
5Professor, Dept. of Computer Engineering, SVIT Nashik, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract:- Many web applications provide secondary
authentication methods, i.e., secret questions (or password
recovery questions), to reset the account password when a
user’s login fails. However, the answers to many such secret
questions can be easily guessed by an acquaintance or
exposed to a stranger that has access to public online tools
(e.g., online social networks); moreover, a user may forget
her/his answers long after creating the secret questions.
Today’s prevalence of smart phones has granted us new
opportunities to observe and understand how the personal
data collected by smart phone sensors and apps can help
create personalized secret questions without violating the
users’ privacy concerns. In this paper, we present a Secret-
Question based Authentication system, called “Secret-QA”
that creates a set of secret questions on basic of people’s
smart phone usage. We develop a prototype on Android
smart phones, and evaluate the security of the secret
questions by asking the acquaintance/stranger who
participate in our user study to guess the answers with and
without the help of online tools; meanwhile, we observe the
questions’ reliability by asking participants to answer their
own questions. To remind modern people of something at a
specific time and location, Smart Location Reminder is a
boon. To serve the purpose, implementing anapplication for
Android-based Smart phones and tablets which is not only
time based but also location based.
Key Words: Sensor fusion, Authentication, Insurance,
Invasive software (e.g., viruses, worms, Trojan horses),
Physical security, Unauthorized access, Location based
reminder, GPS, Mobile Application
I. INTRODUCTION
SECRET questions (a.k.a password recovery questions)have
been widely used by many web applications as the
secondary authentication method for resetting the account
password when the primary credential is lost [1]. When
creating an online account, a user may be requiredtochoose
a secret question from a pre-determined list providedbythe
server, and set answers accordingly. [2], The user can reset
his account password by providing the correct answers to
the secret questions later. [3], For the ease of setting and
memorizing the answers, most secret questions are blank-
fillings (a.k.a. fill-in-theblank,orshort-answer questions)[4],
and are created based on the longtermknowledgeofa user’s
personal history that may not change over months/years
(e.g., “What’s the model of your first car?”). However,
existing research has revealed that such blank-filling
questions created upontheuser’slongtermhistorymaylead
to poor security and reliability [5], [6]. The “security” of a
secret question depends on the validity of a hidden
assumption: A user’s long-term personal history
/information is only known by the user himself. However,
this assumption does not hold when a user’s personal
information can be acquired by an acquaintance or by a
stranger with access to public user profiles.Anacquaintance
of a user can easily infer the answers to the user’s secret
questions (e.g., “name of pet”) [4]. Moreover, a stranger can
figure out the answers leaked from public user profiles in
online social networks or search engine results (e.g., “the
hospital your youngest child was born in”) [7]. The
“reliability” of a secret question is its memorability the
required effort or difficulty of memorizing the correct
answer. Without a careful choice of a blank-filling secret
question, a user may be declined to log in, because hecannot
remember the exact answer that he provided, or he may
misspell the input that requires the perfect literally-
matching to the correct answer [8]. The recentprevalence of
Smartphone has provided a rich source of the user’s
personal data related to the knowledge of his short-term
history, i.e., the data collected by the Smartphone sensors
and apps. Is it feasible to use the knowledge of one’s short
term personal history (typically within one month) for
creating his secret question?
 Intuitively, the short-term personal history is less
likely to be exposed to a stranger or acquaintance,
because the rapid variations of an event that a
person has experienced within a short term will
increase the resilience to guess attacks [9], [10].
This implies improved security for such secret
questions.
 Moreover, research findings in psychology show
that one can easily memorize the details of his
short-term activity, if this activity occurs multiple
times during a short-term (e.g., calling a friend
many times), and/ or this activity heavily
involves his time and effort in a short time period
(e.g., running exercise) [11].
In this paper, we present a Secret-Question based
Authentication system, called “Secret-QA”, takingadvantage
of the data of Smartphone sensors and apps without
violating the user privacy. Meanwhile, we develop a
prototype of Secret- QA, and conduct an experimental user
study involving 88 volunteers to evaluate the reliability and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1055
security of the set of secret question created in the system.
Specifically,
 We design a user authentication system with a set
of secret questions created based on the data of
users’ short-term Smartphone usage.
 We evaluated the reliability and security of the
three types of secret questions (blank-filling,
true/false, and multiple-choice) with a
comprehensive experiment involving 88
participants.
 The experimental results show that the
combination of multiple lightweight true-false and
multiple choice questions required less input effort
with the same strength provided by blank-filling
questions.
 We evaluate the usability of the system, and find
that the Secret-QA system is easiertousethanthose
existing authentication system with secret
questions based on users’ long-term historic data
The rest of this paper is organized as follows: we
provide background knowledge in Section 2. In Sections 3,
we give an overview of the system design. We present our
approach of creating secret questions in Section 4. In
Sections 5 and 6, we evaluate the system performance over
all created secret questions. We conclude the paper in
Section 7.
2. OBJECTIVE
1. To make question papers with varied questions and
which meet learning objectives of the course.
2. To generate the question paper from teacher entered
specification within few seconds.
3. To cover all aspects of the course objectives and avoid
duplication of questions in the subsequent exams.
3. LITERATURE SURVEY
The blank-filling secret questions are dominant as the
mainstream authentication solution, especially in web and
email authentication systems [1], despite the criticismonits
security and reliability. Guessing Attacks by Acquaintance
and Stranger. The security of secret questions for
authentication was studied by Zviran and Haga in 1990 [2],
which indicated that the answers of 33 percent questions
can be guessed by the “significant others” who were mainly
participants’ spouses (77 percent) and close friends (17
percent). Another similar studywasconducted byPoddet al,
which revealed a higher rate of successful guessing (39.5
percent) [3].
A recent study showed that even an open question written
by the user himself was still vulnerable to the guessing
attacks launched by his acquaintance [4]. On the other hand,
strangers can be more sophisticated than ever to launch the
guessing attacks, as they can access the user’s personal
history through online social networks(OSN)orotherpublic
online tools. Therefore, the statistical guessing has become
an effective way to compromise a few personal “secret”
questions [5] (e.g., “Where were you born?”, “What is the
name of your high school?”). Poor reliability of secret
questions in Real World. Regarding the reliability, a secret
question should be memory-wise effortless for users [6].
However, today’s mainstream secret question methods fail
to meet this requirement.
A recent study revealed that nearly 20 percent users of four
famous webmail providers forgot their answers within six
months [4]. Moreover, dominant blank-filling secret
questions with case sensitive answers require the perfect
literally matching to the set answer, which also contributes
to its poor reliability. Recent Proposals of User
Authentication Systems. To reduce the vulnerability to
guessing attacks, Babic et al tried using short-term
information such as a user’s dynamic Internet activities for
creating his secret questions, namelynetwork activities(e.g.,
browsing history), physical events (e.g., planned meetings,
calendar items), and conceptual opinions (e.g., opinions
derived from browsing, emails) [12]. They emphasized that
frequently-changing secret questions will be difficult for
attackers to guess the answers.
However, this research is based on the data related to a
user’s Internet activities, while our work leverages the
mobile phone sensor and app data that can record a user’s
physical world activities, for creating secret questions. For
better reliability, one may choose other types of secret
questions rather than blank-filling questions to avoid the
difficulty in recalling and inputting the perfect literally
matching answer. For example, the login to an online social
network requires a user to recognize one of his friends in a
photo [13].
However, it is feasible that a user fails to recognize if he is
not familiar to that particular friend chosen by the
authentication server. Such existing proposals serve as a
good start of using one’s short-term activities to create
secret questions as well as trying other questiontypes.Since
the Smartphone has become one’s most inseparable device
of recording his life, this paper presents a user
authentication system Secret-QAtostudyonhowone’sshort
term history—almost all types of one’s activities sensible to
the Smartphone—can benefit the security and reliability of
secret questions.
Meanwhile, we evaluate the attack robustness of using a
combination of many lightweight questions (true/false,
multiple-choice) instead of using the blank-fillings, in order
to strike a balanced tradeoff between security(and/or
reliability) and usability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1056
4. Architecture Diagram
Fig. 1. System architecture of Secret-QA, for a typical user
scenario of resetting the account password through
answering the secret questions.
Secret-QA Client App. Given the designatedsensorsandapps
for building the authentication system, we develop a Secret-
QA client app called “EventLog” to extract the features for
question generation. As shown in the block diagram (the
step 0 in Fig. 1), the client app schedules the feature
extraction process periodically, and then features will be
recorded in the local databases. For example, we adopt
libSVM [15] on Android to detect motionrelateduser events,
and we roughly set the minimum duration to 10 minutes for
noise removal (details on how to create questions and
algorithms for other types of events extraction will be given
in Section 4). Note that our extraction of user events are
most lazily scheduled using Android Listener [16] to save
battery; meanwhile, we will pause the scheduling for some
sensors after the screen is locked (e.g., app usage), because
no events can happen during screen-lock periods.Secret-QA
Server. A trusted server is used as the auditor, which can
also provide the user authentication service even if the
phone is not available. As shown in block diagram of Fig. 1,
when authentication is needed, users’ phone can generate
questions with local sanitized data and send the
answers/results (e.g., how many questions they answered
correctly) to auditors via HTTPS channels.
A Three-Phase Challenge Response Protocol
As shown in Fig. 1 (from step 1 – 5), a service provider needs
to authenticate the user’s identity (typically forresettingthe
account password) through our trusted server. The service
prescribes three phases for authentication.
 Issue: the user issues an authentication request to
the service provider (e.g., an OSN website,thestep1
in Fig. 1), then the OSN website asks our trusted
server for one or more encrypted secret questions
and its answers; the questions are finally
transferred to the user displaying on the smart
phones (the step 2 – 3 in Fig. 1). The information at
this phase must be sent over a secure channel [15]
against the malicious eavesdroppers.
 Challenge: the user provides answers to the
challenge questions accordingtohis/hershortterm
memory, then sends it back to the OSN website (the
step 4 in Fig. 1).
 Authentication: the authentication is successful if
the user’s response conforms to the correct
answers; otherwise, a potential attack isdetected.If
the times of authentication failure exceeds the
threshold, our trusted server woulddenytoprovide
service for this particular user, as theinthelaststep
in Fig. 1.
Note that the interactions with server are also necessary to
improve the resilience to some obvious attack vectors in
local operation mode. For instance, if a user’s mobile phone
is stolen/lost (or the user has been followed by a stranger
for days), the user can disable Even Log functionality (or
remote lock/swipe out the phone) to eliminatethedangerof
potential adversary who records the users’ recent activities
with the help of server.
Threat Models
Former studies including [2], [3], [4] focused on attacks
launched by users’ significant others or acquaintances, but
they ignored malicious guessing attacks from strangers.
Moreover, sophisticated attackers could take advantage of
online tools to increase their guess rate [5]. Thus, we
consider threat models of the two above crossed factors
(acquaintance versus stranger; with versus without online
tools or external help): (1) acquaintanceattacksusingonline
tools, (2) acquaintance attacks without external help, (3)
stranger attacks using online tools, (4) stranger attacks
without external help.
5. CONCLUSION
In this paper, we present a Secret-Question based
Authentication system, called “Secret-QA”, and conduct a
user study to understand how much the personal data
collected by Smartphone sensors and appscanhelpimprove
the security of secret questions without violating the users’
privacy. We create a set of questions based on the data
related to sensors and apps, which reflect the users’ short-
term activities and Smartphone usage. We measure the
reliability of these questions by asking participants to
answer these question, as well as launching the
acquaintance/stranger guessing attacks with and without
help of online tools, and we are considering establishing a
probabilistic model based on a large scale of user data to
characterize the security of the secret questions. In our
experiment, the secret question related to motion sensors,
calendar, app installment, and part of legacy apps(call)have
the best performance in terms of memorability and the
attack resilience, which outperform theconventional secret-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1057
question based approaches that are created based on a
user’s long-term history/information.
6. REFERENCES
[1] R. Reeder and S. Schechter, “When the password doesn’t
work: Secondary authentication for websites,”IEEESecurity
Privacy., vol. 9, no. 2, pp. 43–49, Mar. 2011.
[2] M. Zviran and W. J. Haga, “User authentication by
cognitive passwords: An empirical assessment,” in Proc. 5th
Jerusalem Conf. Inf. Tech., Next Decade Inf. Tech., (Cat. No.
90TH0326-9), 1990, pp. 137–144.
[3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective
computer security: Cognitive and associative passwords,” in
Proc., 6th Australian Conf.Comput.-HumanInteraction,1996,
pp. 304–305.
[4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret.
Measuring the security and reliability of authentication via
secret questions,” in Proc. 30th IEEESymp.SecurityPrivacy.,
2009, pp. 375–390.
[5] S. Schechter, C. Herley, and M. Mitzenmacher,“Popularity
is everything: A new approach to protectingpasswordsfrom
statistical-guessing attacks,” in Proc. 5th USENIX Conf. Hot
Topics Security, 2010, pp. 1–8.
[6] D. A. Mike Just, “Personal choice and challengequestions:
A security and usability assessment,” in Proc. 5th Symp.
Usable Privacy Security, p. 8. ACM, 2009.
[7] A. Rabkin, “Personal knowledge questions for fallback
authentication: Security questions in the era of facebook,” in
Proc. 4th Symp. Usable Privacy Security, 2008, pp. 13–23.
[8] J. C. Read and B. Cassidy, “Designing textual password
systems for children,” in Proc. 11thInt.Conf.InteractionDes.
Children, 2012, pp. 200–203.
[9] H. Ebbinghaus, Memory: A Contribution to Experimental
Psychology. New York, NY, USA: Teachers college, Columbia
University, 1913, no. 3.
[10] F. I. Craik and R. S. Lockhart, “Levels of processing: A
framework for memory research,” J. Verbal Learning Verbal
Behavior, vol. 11, no. 6, pp. 671–684, 1972.
[11] T. M. Wolf and J. C. Jahnke, “Effects of intraserial
repetition on short-term recognition and recall,” J. Exp.
Psychology, vol. 77, no. 4, p. 572, 1968.
[12] A. Babic, H. Xiong, D. Yao, and L. Iftode, “Building robust
authentication systems with activity-based personal
questions,” in Proc. SafeConfig. 2009, pp. 19–24.
[13] H. Kim, J. Tang, and R. Anderson, “Social authentication:
Harder than it looks,” in Proc. 16th Int. Conf. Financial
Cryptography Data Security, 2012, pp. 1–15.
[14] S. Hemminki,P.Nurmi,andS.Tarkoma,“Accelerometer-
based transportation mode detection on smartphones,” in
Proc. 11th ACM Conf. Embedded Networked Sens. Syst.,
2013, pp. 13:1–13:14. [Online]. Available:
http://doi.acm.org/10.1145/2517351.2517367.
[15] (2015). libsvm on android, GitHub [Online]. Available:
https:// github.com/cnbuff410/Libsvm-androidjni.

More Related Content

PDF
IRJET- Autobiographical Fallback Authentication using Smartphones
PDF
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
BASICS OF ETHICAL HACKING
PDF
Behavioural biometrics and cognitive security authentication comparison study
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
Generic Authentication System
DOC
Cis 333 Education Organization / snaptutorial.com
IRJET- Autobiographical Fallback Authentication using Smartphones
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
BASICS OF ETHICAL HACKING
Behavioural biometrics and cognitive security authentication comparison study
Keystroke Dynamics Authentication with Project Management System
Generic Authentication System
Cis 333 Education Organization / snaptutorial.com

What's hot (20)

PDF
Single sign on mechanism for distributed computing
PDF
CIS 333 Life of the Mind/newtonhelp.com   
DOC
CIS 333 Imagine Your Future/newtonhelp.com   
DOCX
Cis 333 Extraordinary Success/newtonhelp.com
PDF
Cis 333 Enhance teaching / snaptutorial.com
DOCX
CIS 333 Exceptional Education / snaptutorial.com
PDF
Kg2417521755
PDF
Survey on cloud computing security techniques
PDF
CIS 333 Effective Communication - tutorialrank.com
PDF
Investigating the Combination of Text and Graphical Passwords for a more secu...
PDF
Multilevel authentication using gps and otp techniques
PDF
IRJET- Crypto-Currencies How Secure are they?
PDF
Count based hybrid graphical password to prevent brute force attack and shoul...
PDF
Honeywords for Password Security and Management
PDF
E1802052327
PDF
Survey mobile app
PDF
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
PDF
Software reusabilitydevelopment through NFL approach For identifying security...
PDF
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
PDF
IRJET- A Survey Paper on Secured Email Server Using 3DES
Single sign on mechanism for distributed computing
CIS 333 Life of the Mind/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Enhance teaching / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
Kg2417521755
Survey on cloud computing security techniques
CIS 333 Effective Communication - tutorialrank.com
Investigating the Combination of Text and Graphical Passwords for a more secu...
Multilevel authentication using gps and otp techniques
IRJET- Crypto-Currencies How Secure are they?
Count based hybrid graphical password to prevent brute force attack and shoul...
Honeywords for Password Security and Management
E1802052327
Survey mobile app
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
Software reusabilitydevelopment through NFL approach For identifying security...
IRJET- An Intrusion Detection and Protection System by using Data Mining ...
IRJET- A Survey Paper on Secured Email Server Using 3DES
Ad

Similar to IRJET- Smartphone Sensor based Security Questions and Location (20)

DOCX
Understandingphone sensor and app data for enhancing security
PDF
Secrets, Lies, and Account Recovery
PDF
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
PPTX
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
PDF
Security Questions Considered Harmful
PDF
IRJET - Secure Banking Application with Image and GPS Location
PDF
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
PDF
NDSS_submission_240
PDF
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
PDF
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
PDF
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
PDF
IRJET- Password Management Kit for Secure Authentication
PPT
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
PDF
Graphical Password Authentication using Image Segmentation
PPT
Improving Usable Authentication
PDF
ipas implicit password authentication system ieee 2011
PDF
Ipas implicit password_authentication_system
PPTX
Behavioral biometrics mechanism for delaying password obsolescence
PDF
IRJET- A Shoulder Surfing Resistant Graphical Verification System
DOCX
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Understandingphone sensor and app data for enhancing security
Secrets, Lies, and Account Recovery
SELF AUTHENTICATION” AN APPROACH FOR PASSWORD FREE AUTHENTICATION
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Security Questions Considered Harmful
IRJET - Secure Banking Application with Image and GPS Location
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
NDSS_submission_240
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
IRJET- Password Management Kit for Secure Authentication
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Graphical Password Authentication using Image Segmentation
Improving Usable Authentication
ipas implicit password authentication system ieee 2011
Ipas implicit password_authentication_system
Behavioral biometrics mechanism for delaying password obsolescence
IRJET- A Shoulder Surfing Resistant Graphical Verification System
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Sustainable Sites - Green Building Construction
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Project quality management in manufacturing
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Well-logging-methods_new................
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
web development for engineering and engineering
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
DOCX
573137875-Attendance-Management-System-original
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Sustainable Sites - Green Building Construction
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Model Code of Practice - Construction Work - 21102022 .pdf
Project quality management in manufacturing
Lecture Notes Electrical Wiring System Components
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mechanical Engineering MATERIALS Selection
Well-logging-methods_new................
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
additive manufacturing of ss316l using mig welding
UNIT 4 Total Quality Management .pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
web development for engineering and engineering
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
573137875-Attendance-Management-System-original

IRJET- Smartphone Sensor based Security Questions and Location

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1054 Smartphone Sensor Based Security Questions and Location Ms. Ghodekar P.V1, Ms. Mogal B. S2, Ms. Kasar S.R3, Ms. Deshmukh S. R4, Prof. Mr. Thosar D.S5 1,2,3,4B.E Student, computer engineering, SVIT Nashik. 5Professor, Dept. of Computer Engineering, SVIT Nashik, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract:- Many web applications provide secondary authentication methods, i.e., secret questions (or password recovery questions), to reset the account password when a user’s login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools (e.g., online social networks); moreover, a user may forget her/his answers long after creating the secret questions. Today’s prevalence of smart phones has granted us new opportunities to observe and understand how the personal data collected by smart phone sensors and apps can help create personalized secret questions without violating the users’ privacy concerns. In this paper, we present a Secret- Question based Authentication system, called “Secret-QA” that creates a set of secret questions on basic of people’s smart phone usage. We develop a prototype on Android smart phones, and evaluate the security of the secret questions by asking the acquaintance/stranger who participate in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the questions’ reliability by asking participants to answer their own questions. To remind modern people of something at a specific time and location, Smart Location Reminder is a boon. To serve the purpose, implementing anapplication for Android-based Smart phones and tablets which is not only time based but also location based. Key Words: Sensor fusion, Authentication, Insurance, Invasive software (e.g., viruses, worms, Trojan horses), Physical security, Unauthorized access, Location based reminder, GPS, Mobile Application I. INTRODUCTION SECRET questions (a.k.a password recovery questions)have been widely used by many web applications as the secondary authentication method for resetting the account password when the primary credential is lost [1]. When creating an online account, a user may be requiredtochoose a secret question from a pre-determined list providedbythe server, and set answers accordingly. [2], The user can reset his account password by providing the correct answers to the secret questions later. [3], For the ease of setting and memorizing the answers, most secret questions are blank- fillings (a.k.a. fill-in-theblank,orshort-answer questions)[4], and are created based on the longtermknowledgeofa user’s personal history that may not change over months/years (e.g., “What’s the model of your first car?”). However, existing research has revealed that such blank-filling questions created upontheuser’slongtermhistorymaylead to poor security and reliability [5], [6]. The “security” of a secret question depends on the validity of a hidden assumption: A user’s long-term personal history /information is only known by the user himself. However, this assumption does not hold when a user’s personal information can be acquired by an acquaintance or by a stranger with access to public user profiles.Anacquaintance of a user can easily infer the answers to the user’s secret questions (e.g., “name of pet”) [4]. Moreover, a stranger can figure out the answers leaked from public user profiles in online social networks or search engine results (e.g., “the hospital your youngest child was born in”) [7]. The “reliability” of a secret question is its memorability the required effort or difficulty of memorizing the correct answer. Without a careful choice of a blank-filling secret question, a user may be declined to log in, because hecannot remember the exact answer that he provided, or he may misspell the input that requires the perfect literally- matching to the correct answer [8]. The recentprevalence of Smartphone has provided a rich source of the user’s personal data related to the knowledge of his short-term history, i.e., the data collected by the Smartphone sensors and apps. Is it feasible to use the knowledge of one’s short term personal history (typically within one month) for creating his secret question?  Intuitively, the short-term personal history is less likely to be exposed to a stranger or acquaintance, because the rapid variations of an event that a person has experienced within a short term will increase the resilience to guess attacks [9], [10]. This implies improved security for such secret questions.  Moreover, research findings in psychology show that one can easily memorize the details of his short-term activity, if this activity occurs multiple times during a short-term (e.g., calling a friend many times), and/ or this activity heavily involves his time and effort in a short time period (e.g., running exercise) [11]. In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, takingadvantage of the data of Smartphone sensors and apps without violating the user privacy. Meanwhile, we develop a prototype of Secret- QA, and conduct an experimental user study involving 88 volunteers to evaluate the reliability and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1055 security of the set of secret question created in the system. Specifically,  We design a user authentication system with a set of secret questions created based on the data of users’ short-term Smartphone usage.  We evaluated the reliability and security of the three types of secret questions (blank-filling, true/false, and multiple-choice) with a comprehensive experiment involving 88 participants.  The experimental results show that the combination of multiple lightweight true-false and multiple choice questions required less input effort with the same strength provided by blank-filling questions.  We evaluate the usability of the system, and find that the Secret-QA system is easiertousethanthose existing authentication system with secret questions based on users’ long-term historic data The rest of this paper is organized as follows: we provide background knowledge in Section 2. In Sections 3, we give an overview of the system design. We present our approach of creating secret questions in Section 4. In Sections 5 and 6, we evaluate the system performance over all created secret questions. We conclude the paper in Section 7. 2. OBJECTIVE 1. To make question papers with varied questions and which meet learning objectives of the course. 2. To generate the question paper from teacher entered specification within few seconds. 3. To cover all aspects of the course objectives and avoid duplication of questions in the subsequent exams. 3. LITERATURE SURVEY The blank-filling secret questions are dominant as the mainstream authentication solution, especially in web and email authentication systems [1], despite the criticismonits security and reliability. Guessing Attacks by Acquaintance and Stranger. The security of secret questions for authentication was studied by Zviran and Haga in 1990 [2], which indicated that the answers of 33 percent questions can be guessed by the “significant others” who were mainly participants’ spouses (77 percent) and close friends (17 percent). Another similar studywasconducted byPoddet al, which revealed a higher rate of successful guessing (39.5 percent) [3]. A recent study showed that even an open question written by the user himself was still vulnerable to the guessing attacks launched by his acquaintance [4]. On the other hand, strangers can be more sophisticated than ever to launch the guessing attacks, as they can access the user’s personal history through online social networks(OSN)orotherpublic online tools. Therefore, the statistical guessing has become an effective way to compromise a few personal “secret” questions [5] (e.g., “Where were you born?”, “What is the name of your high school?”). Poor reliability of secret questions in Real World. Regarding the reliability, a secret question should be memory-wise effortless for users [6]. However, today’s mainstream secret question methods fail to meet this requirement. A recent study revealed that nearly 20 percent users of four famous webmail providers forgot their answers within six months [4]. Moreover, dominant blank-filling secret questions with case sensitive answers require the perfect literally matching to the set answer, which also contributes to its poor reliability. Recent Proposals of User Authentication Systems. To reduce the vulnerability to guessing attacks, Babic et al tried using short-term information such as a user’s dynamic Internet activities for creating his secret questions, namelynetwork activities(e.g., browsing history), physical events (e.g., planned meetings, calendar items), and conceptual opinions (e.g., opinions derived from browsing, emails) [12]. They emphasized that frequently-changing secret questions will be difficult for attackers to guess the answers. However, this research is based on the data related to a user’s Internet activities, while our work leverages the mobile phone sensor and app data that can record a user’s physical world activities, for creating secret questions. For better reliability, one may choose other types of secret questions rather than blank-filling questions to avoid the difficulty in recalling and inputting the perfect literally matching answer. For example, the login to an online social network requires a user to recognize one of his friends in a photo [13]. However, it is feasible that a user fails to recognize if he is not familiar to that particular friend chosen by the authentication server. Such existing proposals serve as a good start of using one’s short-term activities to create secret questions as well as trying other questiontypes.Since the Smartphone has become one’s most inseparable device of recording his life, this paper presents a user authentication system Secret-QAtostudyonhowone’sshort term history—almost all types of one’s activities sensible to the Smartphone—can benefit the security and reliability of secret questions. Meanwhile, we evaluate the attack robustness of using a combination of many lightweight questions (true/false, multiple-choice) instead of using the blank-fillings, in order to strike a balanced tradeoff between security(and/or reliability) and usability.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1056 4. Architecture Diagram Fig. 1. System architecture of Secret-QA, for a typical user scenario of resetting the account password through answering the secret questions. Secret-QA Client App. Given the designatedsensorsandapps for building the authentication system, we develop a Secret- QA client app called “EventLog” to extract the features for question generation. As shown in the block diagram (the step 0 in Fig. 1), the client app schedules the feature extraction process periodically, and then features will be recorded in the local databases. For example, we adopt libSVM [15] on Android to detect motionrelateduser events, and we roughly set the minimum duration to 10 minutes for noise removal (details on how to create questions and algorithms for other types of events extraction will be given in Section 4). Note that our extraction of user events are most lazily scheduled using Android Listener [16] to save battery; meanwhile, we will pause the scheduling for some sensors after the screen is locked (e.g., app usage), because no events can happen during screen-lock periods.Secret-QA Server. A trusted server is used as the auditor, which can also provide the user authentication service even if the phone is not available. As shown in block diagram of Fig. 1, when authentication is needed, users’ phone can generate questions with local sanitized data and send the answers/results (e.g., how many questions they answered correctly) to auditors via HTTPS channels. A Three-Phase Challenge Response Protocol As shown in Fig. 1 (from step 1 – 5), a service provider needs to authenticate the user’s identity (typically forresettingthe account password) through our trusted server. The service prescribes three phases for authentication.  Issue: the user issues an authentication request to the service provider (e.g., an OSN website,thestep1 in Fig. 1), then the OSN website asks our trusted server for one or more encrypted secret questions and its answers; the questions are finally transferred to the user displaying on the smart phones (the step 2 – 3 in Fig. 1). The information at this phase must be sent over a secure channel [15] against the malicious eavesdroppers.  Challenge: the user provides answers to the challenge questions accordingtohis/hershortterm memory, then sends it back to the OSN website (the step 4 in Fig. 1).  Authentication: the authentication is successful if the user’s response conforms to the correct answers; otherwise, a potential attack isdetected.If the times of authentication failure exceeds the threshold, our trusted server woulddenytoprovide service for this particular user, as theinthelaststep in Fig. 1. Note that the interactions with server are also necessary to improve the resilience to some obvious attack vectors in local operation mode. For instance, if a user’s mobile phone is stolen/lost (or the user has been followed by a stranger for days), the user can disable Even Log functionality (or remote lock/swipe out the phone) to eliminatethedangerof potential adversary who records the users’ recent activities with the help of server. Threat Models Former studies including [2], [3], [4] focused on attacks launched by users’ significant others or acquaintances, but they ignored malicious guessing attacks from strangers. Moreover, sophisticated attackers could take advantage of online tools to increase their guess rate [5]. Thus, we consider threat models of the two above crossed factors (acquaintance versus stranger; with versus without online tools or external help): (1) acquaintanceattacksusingonline tools, (2) acquaintance attacks without external help, (3) stranger attacks using online tools, (4) stranger attacks without external help. 5. CONCLUSION In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, and conduct a user study to understand how much the personal data collected by Smartphone sensors and appscanhelpimprove the security of secret questions without violating the users’ privacy. We create a set of questions based on the data related to sensors and apps, which reflect the users’ short- term activities and Smartphone usage. We measure the reliability of these questions by asking participants to answer these question, as well as launching the acquaintance/stranger guessing attacks with and without help of online tools, and we are considering establishing a probabilistic model based on a large scale of user data to characterize the security of the secret questions. In our experiment, the secret question related to motion sensors, calendar, app installment, and part of legacy apps(call)have the best performance in terms of memorability and the attack resilience, which outperform theconventional secret-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1057 question based approaches that are created based on a user’s long-term history/information. 6. REFERENCES [1] R. Reeder and S. Schechter, “When the password doesn’t work: Secondary authentication for websites,”IEEESecurity Privacy., vol. 9, no. 2, pp. 43–49, Mar. 2011. [2] M. Zviran and W. J. Haga, “User authentication by cognitive passwords: An empirical assessment,” in Proc. 5th Jerusalem Conf. Inf. Tech., Next Decade Inf. Tech., (Cat. No. 90TH0326-9), 1990, pp. 137–144. [3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective computer security: Cognitive and associative passwords,” in Proc., 6th Australian Conf.Comput.-HumanInteraction,1996, pp. 304–305. [4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret. Measuring the security and reliability of authentication via secret questions,” in Proc. 30th IEEESymp.SecurityPrivacy., 2009, pp. 375–390. [5] S. Schechter, C. Herley, and M. Mitzenmacher,“Popularity is everything: A new approach to protectingpasswordsfrom statistical-guessing attacks,” in Proc. 5th USENIX Conf. Hot Topics Security, 2010, pp. 1–8. [6] D. A. Mike Just, “Personal choice and challengequestions: A security and usability assessment,” in Proc. 5th Symp. Usable Privacy Security, p. 8. ACM, 2009. [7] A. Rabkin, “Personal knowledge questions for fallback authentication: Security questions in the era of facebook,” in Proc. 4th Symp. Usable Privacy Security, 2008, pp. 13–23. [8] J. C. Read and B. Cassidy, “Designing textual password systems for children,” in Proc. 11thInt.Conf.InteractionDes. Children, 2012, pp. 200–203. [9] H. Ebbinghaus, Memory: A Contribution to Experimental Psychology. New York, NY, USA: Teachers college, Columbia University, 1913, no. 3. [10] F. I. Craik and R. S. Lockhart, “Levels of processing: A framework for memory research,” J. Verbal Learning Verbal Behavior, vol. 11, no. 6, pp. 671–684, 1972. [11] T. M. Wolf and J. C. Jahnke, “Effects of intraserial repetition on short-term recognition and recall,” J. Exp. Psychology, vol. 77, no. 4, p. 572, 1968. [12] A. Babic, H. Xiong, D. Yao, and L. Iftode, “Building robust authentication systems with activity-based personal questions,” in Proc. SafeConfig. 2009, pp. 19–24. [13] H. Kim, J. Tang, and R. Anderson, “Social authentication: Harder than it looks,” in Proc. 16th Int. Conf. Financial Cryptography Data Security, 2012, pp. 1–15. [14] S. Hemminki,P.Nurmi,andS.Tarkoma,“Accelerometer- based transportation mode detection on smartphones,” in Proc. 11th ACM Conf. Embedded Networked Sens. Syst., 2013, pp. 13:1–13:14. [Online]. Available: http://doi.acm.org/10.1145/2517351.2517367. [15] (2015). libsvm on android, GitHub [Online]. Available: https:// github.com/cnbuff410/Libsvm-androidjni.