Fuzzy logic-based implicit authentication for mobile access control

作者: Feng Yao , Suleiman Y. Yerima , BooJoong Kang , Sakir Sezer

DOI: 10.1109/SAI.2016.7556097

关键词:

摘要: In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The computes an aggregate score selected features and threshold real-time current historic data depicting routine. tuned fuzzy system then applied aggregated determine trust level user. fuzzy-integrated designed to: operate adaptively completely background, require minimal training period, enable high accuracy while provide timely detection abnormal activity. paper, we explore depth. Gaussian triangle-based membership functions are investigated compared using real over several weeks from different Android phone users. presented results show that our approach highly effective, viable for lightweight devices.

参考文章(15)
Nicholas Micallef, Hilmi Gunes Kayacik, David Aspinall, Lynne Baillie, Mike Just, Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors arXiv: Cryptography and Security. ,(2014)
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow, Implicit authentication through learning user behavior international conference on information security. pp. 99- 113 ,(2010) , 10.1007/978-3-642-18178-8_9
Dimitrios Lymberopoulos, Karin Strauss, Chuan Qin, Oriana Riva, Progressive authentication: deciding when to authenticate on mobile phones usenix security symposium. pp. 15- 15 ,(2012)
Aditi Gupta, Markus Miettinen, N. Asokan, Marcin Nagy, Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling privacy security risk and trust. pp. 471- 480 ,(2012) , 10.1109/SOCIALCOM-PASSAT.2012.60
Xiao-Qin Cao, Zhi-Qiang Liu, Type-2 Fuzzy Topic Models for Human Action Recognition IEEE Transactions on Fuzzy Systems. ,vol. 23, pp. 1581- 1593 ,(2015) , 10.1109/TFUZZ.2014.2370678
Macam S. Dattathreya, Harpreet Singh, Thomas Meitzler, Detection and elimination of a potential fire in engine and battery compartments of hybrid electric vehicles Advances in Fuzzy Systems. ,vol. 2012, pp. 6- ,(2012) , 10.1155/2012/687652
Suleiman Y Yerima, Implementation and Evaluation of Measurement-Based Admission Control Schemes Within a Converged Networks QoS Management Framework International Journal of Computer Networks & Communications. ,vol. 3, pp. 137- 152 ,(2011) , 10.5121/IJCNC.2011.3410
Ning Wang, Meng Joo Er, Min Han, Dynamic Tanker Steering Control Using Generalized Ellipsoidal-Basis-Function-Based Fuzzy Neural Networks IEEE Transactions on Fuzzy Systems. ,vol. 23, pp. 1414- 1427 ,(2015) , 10.1109/TFUZZ.2014.2362144
Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, Ian Oakley, CASA: context-aware scalable authentication symposium on usable privacy and security. pp. 3- ,(2013) , 10.1145/2501604.2501607
Mohamad El-Abed, Romain Giot, Baptiste Hemery, Christophe Rosenberger, A study of users' acceptance and satisfaction of biometric systems 44th Annual 2010 IEEE International Carnahan Conference on Security Technology. pp. 170- 178 ,(2010) , 10.1109/CCST.2010.5678678