Publications

DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure
[25/Jan/2018]

On-demand ride services and the rideshare infrastructure primarily focus on the minimization of travel time and cost. However, the safety of riders is overlooked by service providers. For driver authentication, existing identity management methods typically check the driving license, which can be easily stolen, forged, or misused. Further, background checks are not performed at all; instead, social profiles and peer reviews are used to foster trust, thereby compromising the safety and security of riders.

Authors: 
Sandeep Gupta
Attaullah Buriro
Bruno Crispo
Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access
[10/Jan/2018]

Smartphones are the most popular and widespread personal devices. Apart from their conventional use, i.e., calling and texting, they have also been used to perform multiple security-sensitive activities, such as online banking and shopping, social networking, taking pictures and emailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, e.g., anytime-anywhere computing, etc. However, on the other side, they also pose security and privacy threats to the users’ stored data.

Authors: 
Sandeep Gupta
Attaullah Buriro
Bruno Crispo
Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)

DialerAuth: A Motion-assisted Touch-based Smartphone User Authentication Scheme
[21/Mar/2018]

This paper introduces DialerAuth - a mechanism which leverages the way a smartphone user taps/enters any “text-independent" 10-digit number (replicating the dialing process) and the hand’s micro-movements she makes while doing so. DialerAuth authenticates the user on the basis of timing differences in the entered 10-digit strokes. DialerAuth provides enhanced security by leveraging the transparent and unobservable layer based on another

Authors: 
Attaullah Buriro
Bruno Crispo
Filippo Del Frari
Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)

Improving MQTT by Inclusion of Usage Control

Due to the increasing pervasiveness of Internet of Things (IoT) and Internet of Everything (IoE) devices, securing both their communications and operations has become of capital importance. Among the several existing IoT protocols, Message Queue Telemetry Transport (MQTT) is a widely-used general purpose one, usable in both constrained and powerful devices, which coordinates data exchanges through a publish/subscribe approach. In this paper, we propose a methodology to increase the security of the MQTT protocol, by including Usage Control in its operative workflow.

Authors: 
Antonio La Marra
Fabio Martinelli
Paolo Mori
Athanasios Rizos
Andrea Saracino
Author (ESR): 
Athanasios Rizos (Consiglio Nazionale Delle Ricerche)

Pages