AUTo Sen : Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors

作者: Mohammed Abuhamad , Tamer Abuhmed , David Mohaisen , DaeHun Nyang , None

DOI: 10.1109/JIOT.2020.2975779

关键词:

摘要: Smartphones have become crucial for our daily life activities and are increasingly loaded with personal information to perform several sensitive tasks, including, mobile banking communication, used storing private photos files. Therefore, there is a high demand applying usable authentication techniques that prevent unauthorized access information. In this article, we propose AUTo Sen , deep-learning-based active approach exploits sensors in consumer-grade smartphones authenticate user. Unlike conventional approaches, based on deep learning identify user distinct behavior from the embedded without user’s interaction smartphone. We investigate different architectures modeling capturing users’ behavioral patterns purpose of authentication. Moreover, explore sufficiency sensory data required accurately users. evaluate real-world set includes 84 participants’ collected using designed data-collection application. The experiments show operates readings only three (accelerometer, gyroscope, magnetometer) frequency, e.g., one attempt every 0.5 s. Using second enables an F1-score approximately 98%, false acceptance rate (FAR) 0.95%, rejection (FRR) 6.67%, equal error (EER) 0.41%. While half 97.52%, FAR 0.96%, FRR 8.08%, EER 0.09%. effects at variable sampling periods performance models under various settings architectures.

参考文章(48)
Zdenka Sitova, Jaroslav Sedenka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, Kiran S. Balagani, HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users IEEE Transactions on Information Forensics and Security. ,vol. 11, pp. 877- 892 ,(2016) , 10.1109/TIFS.2015.2506542
Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, Emmanouil Pavlidakis, Introducing touchstroke: keystroke-based authentication system for smartphones Security and Communication Networks. ,vol. 9, pp. 542- 554 ,(2016) , 10.1002/SEC.1061
Jiyun Wu, Zhide Chen, An implicit identity authentication system considering changes of gesture based on keystroke behaviors International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 470274- ,(2015) , 10.1155/2015/470274
Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M Smith, None, Smudge attacks on smartphone touch screens WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies. pp. 1- 7 ,(2010)
Nicholas Micallef, Hilmi Gunes Kayacik, David Aspinall, Lynne Baillie, Mike Just, Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors arXiv: Cryptography and Security. ,(2014)
Hong Lu, A. J. Bernheim Brush, Bodhi Priyantha, Amy K. Karlson, Jie Liu, SpeakerSense: energy efficient unobtrusive speaker identification on mobile phones international conference on pervasive computing. pp. 188- 205 ,(2011) , 10.1007/978-3-642-21726-5_12
N.L. Clarke, A.R. Mekala, The application of signature recognition to transparent handwriting verification for mobile devices Information Management & Computer Security. ,vol. 15, pp. 214- 225 ,(2007) , 10.1108/09685220710759559
Heather Crawford, Karen Renaud, Tim Storer, A framework for continuous, transparent mobile device authentication Computers & Security. ,vol. 39, pp. 127- 136 ,(2013) , 10.1016/J.COSE.2013.05.005
Florian Schaub, Ruben Deyhle, Michael Weber, Password entry usability and shoulder surfing susceptibility on different smartphone platforms mobile and ubiquitous multimedia. pp. 13- ,(2012) , 10.1145/2406367.2406384
Douglas A. Reynolds, Thomas F. Quatieri, Robert B. Dunn, Speaker Verification Using Adapted Gaussian Mixture Models Digital Signal Processing. ,vol. 10, pp. 19- 41 ,(2000) , 10.1006/DSPR.1999.0361