SlideShare a Scribd company logo
Understanding Smartphone Sensor and App
Data for Enhancing the Security of Secret
Questions
Abstract:
Many web applications provide secondary authentication methods, i.e.,
secret questions (or password recovery questions), to reset the account password
when a user’s login fails. However, the answers to many such secret questions can
be easily guessed by an acquaintance or exposed to a stranger that has access to
public online tools (e.g., online social networks); moreover, a user may forget
her/his answers long after creating the secret questions. Today’s prevalence of
smart phones has granted us new opportunities to observe and understand how the
personal data collected by Smartphone sensors and apps can help create
personalized secret questions without violating the users’ privacy concerns. In this
paper, we present a Secret-Question based Authentication system, called “Secret-
QA” that creates a set of secret questions on basic of people’s Smartphone usage.
We develop a prototype on Android smart phones, and evaluate the security of the
secret questions by asking the acquaintance/stranger who participate in our user
study to guess the answers with and without the help of online tools; meanwhile,
we observe the questions’ reliability by asking participants to answer their own
questions. Our experimental results reveal that the secret questions related to
motion sensors, calendar, app installment, and part of legacy app usage history
(e.g., phone calls) have the best memorability for users as well as the highest
robustness to attacks.
Main Architecture:
SYSTEM DESIGN:
Existing System:
In existing system the application will be having common security
level question that won’t merge with the mobile data or application data.
So that the ease of entering app was more. The attacker can easily make
guess attack on those questions.
Disadvantage:
 Less Security.
 Easy Questions to answer.
 Headache to user.
 Lack of accuracy.
Proposed System:
In proposed system, the application will be having security
question based on their application data and sensor data which are stored
in the local database. This makes the attacker a difficult job to crack the
security level and reach the application.
Advantage:
 More secure.
 Reduce headache on user.
 More Accurate.
 Can store more important data.
Modules Involved:
Understanding smart phones sensor data and app data for enhancing the
security of particular application. This project three modules. They are
1. Personal Details.
2. Banking.
3. Monitor Phone.
1. Personal Details:
Here the user needs to enter the personal details that were only known by
them. Forexample their star signs, their blood group, their lucky number ECT...
These details are stored in database from which the security questions are raised.
Since the personal details are converted as security questions it will be difficult for
attacker to guess the answer.
2. Monitor Phone.
Next Module is monitoring our mobile phone data in order to increase the
security. This process was separated into 3 phases. Application data, Phone status
and battery status.
Monitoring Battery Status
Monitoring Phone Status
Monitoring Applicationsinstalled Monitoring ParticularApplication
3. Banking:
Once the user get pass mark in his security level he can enter into the
banking application.
Result Page
Main Flow Diagram:
SYSTEM SPECIFICATION:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 14’ Colour Monitor.
 Mouse : Optical Mouse.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7 Ultimate.
 Coding Language : Java.
 Front-End : Eclipse.
 Data Base : Sqlite Manger.
CONCLUSION:
In this paper, we present a Secret-Question based Authentication system,
called “Secret-QA”, and conduct a user study to understand how much the personal
data collected by Smartphone sensors and apps can help improve the security of
secret questions without violating the users’ privacy. We create a set of questions
based on the data related to sensors and apps, which reflect the users’ short-term
activities and Smartphone usage. We measure the reliability of these questions by
asking participants to answer this question, as well as launching the
acquaintance/stranger guessing attacks with and without help of online tools, and
we are considering establishing a probabilistic model based on a large scale of user
data to characterize the security of the secret questions. In our experiment, the
secret questions related to motion sensors, calendar, app installment, and part of
legacy apps (call) have the best performance in terms of memorability and the
attack resilience, which outperform the conventional secret-question based
approaches that are created based on a user’s long-term history/information.

More Related Content

PDF
Agile Facial Verification Software - IEUK 2020 Tech
PDF
The Immune System of Internet
PPT
Secure crime identification system
PDF
Irjet v7 i4693
PPTX
Account sharing detection
PPT
Presentation
PPTX
SQL injection
DOCX
Ankit Batra (Updated Resume)
Agile Facial Verification Software - IEUK 2020 Tech
The Immune System of Internet
Secure crime identification system
Irjet v7 i4693
Account sharing detection
Presentation
SQL injection
Ankit Batra (Updated Resume)

What's hot (19)

PPTX
Making Strong Security Easier
PPTX
Parameter tampering
PPTX
website phishing by NR
DOCX
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
PPTX
What is security testing and why it is so important?
PPT
Final review ppt
PPT
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
PDF
VSEC Sourcecode Review Service Profile
PDF
The International Journal of Engineering and Science (The IJES)
DOCX
Generating summary risk scores for mobile applications
PDF
Ijeee 51-57-preventing sql injection attacks in web application
PDF
Generic Authentication System
PDF
1738 1742
PDF
Ld3420072014
PPTX
Sql injection
DOCX
Report police - 6 month training project
PDF
Smartphone Remote Detection and Wipe System using SMS
PPTX
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
PDF
Security Analysis of Mobile Authentication Using QR-Codes
Making Strong Security Easier
Parameter tampering
website phishing by NR
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
What is security testing and why it is so important?
Final review ppt
fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff...
VSEC Sourcecode Review Service Profile
The International Journal of Engineering and Science (The IJES)
Generating summary risk scores for mobile applications
Ijeee 51-57-preventing sql injection attacks in web application
Generic Authentication System
1738 1742
Ld3420072014
Sql injection
Report police - 6 month training project
Smartphone Remote Detection and Wipe System using SMS
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
Security Analysis of Mobile Authentication Using QR-Codes
Ad

Viewers also liked (12)

DOCX
Pravin Arote Updated CV
PPTX
Infografía
PPTX
Leadership Philosophy
PDF
ACTIVIDADES N° 1
PDF
news graphic
PDF
PPTX
Jacky Leung 3rd assign 20121111 v1
DOCX
Caracteristicas de sql server
PDF
Torno CNC TND-200 - Justificativas para a seleção dos materiais
PDF
Справка о компании 2test
PDF
Mapa conceptual - Institutos Reguladores Calidad de Software
PPTX
EMC 005348489
Pravin Arote Updated CV
Infografía
Leadership Philosophy
ACTIVIDADES N° 1
news graphic
Jacky Leung 3rd assign 20121111 v1
Caracteristicas de sql server
Torno CNC TND-200 - Justificativas para a seleção dos materiais
Справка о компании 2test
Mapa conceptual - Institutos Reguladores Calidad de Software
EMC 005348489
Ad

Similar to Understandingphone sensor and app data for enhancing security (20)

PDF
Smart color locking system for android smartphones users
PDF
Provide security about risk score in mobile application’s
PDF
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
PDF
IRJET- Smartphone Sensor based Security Questions and Location
PDF
The good, the bad, and the ugly on integration ai with cybersecurity
PPTX
Standards and methodology for application security assessment
PDF
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
PDF
Generic threats to mobile application
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
PDF
Irjet v7 i3811
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Malware Bytes – Advanced Fault Analysis
ODP
Mobile Apps Security Testing -1
PDF
IRJET- Autobiographical Fallback Authentication using Smartphones
PPTX
Privacy on Mobile Apps
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PPTX
Cyber Security PPT.pptx
PDF
OS-Project-Report-Team-8
Smart color locking system for android smartphones users
Provide security about risk score in mobile application’s
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...
IRJET- Smartphone Sensor based Security Questions and Location
The good, the bad, and the ugly on integration ai with cybersecurity
Standards and methodology for application security assessment
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
Generic threats to mobile application
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
Irjet v7 i3811
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Malware Bytes – Advanced Fault Analysis
Mobile Apps Security Testing -1
IRJET- Autobiographical Fallback Authentication using Smartphones
Privacy on Mobile Apps
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
IRJET - System to Identify and Define Security Threats to the users About The...
Cyber Security PPT.pptx
OS-Project-Report-Team-8

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Project quality management in manufacturing
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
additive manufacturing of ss316l using mig welding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Sustainable Sites - Green Building Construction
bas. eng. economics group 4 presentation 1.pptx
UNIT 4 Total Quality Management .pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Geodesy 1.pptx...............................................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Internet of Things (IOT) - A guide to understanding
573137875-Attendance-Management-System-original
Model Code of Practice - Construction Work - 21102022 .pdf
Project quality management in manufacturing
Automation-in-Manufacturing-Chapter-Introduction.pdf
Foundation to blockchain - A guide to Blockchain Tech

Understandingphone sensor and app data for enhancing security

  • 1. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions Abstract: Many web applications provide secondary authentication methods, i.e., secret questions (or password recovery questions), to reset the account password when a user’s login fails. However, the answers to many such secret questions can be easily guessed by an acquaintance or exposed to a stranger that has access to public online tools (e.g., online social networks); moreover, a user may forget her/his answers long after creating the secret questions. Today’s prevalence of smart phones has granted us new opportunities to observe and understand how the personal data collected by Smartphone sensors and apps can help create personalized secret questions without violating the users’ privacy concerns. In this paper, we present a Secret-Question based Authentication system, called “Secret- QA” that creates a set of secret questions on basic of people’s Smartphone usage. We develop a prototype on Android smart phones, and evaluate the security of the secret questions by asking the acquaintance/stranger who participate in our user study to guess the answers with and without the help of online tools; meanwhile, we observe the questions’ reliability by asking participants to answer their own questions. Our experimental results reveal that the secret questions related to motion sensors, calendar, app installment, and part of legacy app usage history (e.g., phone calls) have the best memorability for users as well as the highest robustness to attacks.
  • 2. Main Architecture: SYSTEM DESIGN: Existing System: In existing system the application will be having common security level question that won’t merge with the mobile data or application data. So that the ease of entering app was more. The attacker can easily make guess attack on those questions. Disadvantage:  Less Security.  Easy Questions to answer.  Headache to user.
  • 3.  Lack of accuracy. Proposed System: In proposed system, the application will be having security question based on their application data and sensor data which are stored in the local database. This makes the attacker a difficult job to crack the security level and reach the application. Advantage:  More secure.  Reduce headache on user.  More Accurate.  Can store more important data. Modules Involved: Understanding smart phones sensor data and app data for enhancing the security of particular application. This project three modules. They are 1. Personal Details. 2. Banking.
  • 4. 3. Monitor Phone. 1. Personal Details: Here the user needs to enter the personal details that were only known by them. Forexample their star signs, their blood group, their lucky number ECT... These details are stored in database from which the security questions are raised. Since the personal details are converted as security questions it will be difficult for attacker to guess the answer. 2. Monitor Phone. Next Module is monitoring our mobile phone data in order to increase the security. This process was separated into 3 phases. Application data, Phone status and battery status. Monitoring Battery Status
  • 5. Monitoring Phone Status Monitoring Applicationsinstalled Monitoring ParticularApplication
  • 6. 3. Banking: Once the user get pass mark in his security level he can enter into the banking application. Result Page
  • 8. SYSTEM SPECIFICATION: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows 7 Ultimate.  Coding Language : Java.  Front-End : Eclipse.  Data Base : Sqlite Manger. CONCLUSION: In this paper, we present a Secret-Question based Authentication system, called “Secret-QA”, and conduct a user study to understand how much the personal data collected by Smartphone sensors and apps can help improve the security of secret questions without violating the users’ privacy. We create a set of questions based on the data related to sensors and apps, which reflect the users’ short-term activities and Smartphone usage. We measure the reliability of these questions by
  • 9. asking participants to answer this question, as well as launching the acquaintance/stranger guessing attacks with and without help of online tools, and we are considering establishing a probabilistic model based on a large scale of user data to characterize the security of the secret questions. In our experiment, the secret questions related to motion sensors, calendar, app installment, and part of legacy apps (call) have the best performance in terms of memorability and the attack resilience, which outperform the conventional secret-question based approaches that are created based on a user’s long-term history/information.