Event-Driven Implicit Authentication for Mobile Access Control

作者: Feng Yao , Suleiman Y. Yerima , BooJoong Kang , Sakir Sezer

DOI: 10.1109/NGMAST.2015.47

关键词:

摘要: In order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the for recognizing legitimate behavior are investigated. The investigated compute aggregate score and a threshold real-time determine trust level current using real data derived from interaction with device. designed to: operate completely background, require minimal training period, enable high recognition rate authentication, prompt detection abnormal activity that can be used trigger explicitly authenticated access control. paper, we investigate computation through standard deviation EWMA (exponentially weighted moving average) based algorithms. result extensive experiments collected over period several weeks Android phone indicates our approach feasible effective lightweight smartphones.

参考文章(12)
Suleiman Y. Yerima, Khalid Al-Begain, Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks IAENG International Journal of Computer Science. ,vol. 36, ,(2009)
Nicholas Micallef, Hilmi Gunes Kayacik, David Aspinall, Lynne Baillie, Mike Just, Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors arXiv: Cryptography and Security. ,(2014)
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow, Implicit authentication through learning user behavior international conference on information security. pp. 99- 113 ,(2010) , 10.1007/978-3-642-18178-8_9
Dimitrios Lymberopoulos, Karin Strauss, Chuan Qin, Oriana Riva, Progressive authentication: deciding when to authenticate on mobile phones usenix security symposium. pp. 15- 15 ,(2012)
Aditi Gupta, Markus Miettinen, N. Asokan, Marcin Nagy, Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling privacy security risk and trust. pp. 471- 480 ,(2012) , 10.1109/SOCIALCOM-PASSAT.2012.60
Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, Heinrich Hussmann, Touch me once and i know it's you! Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems - CHI '12. pp. 987- 996 ,(2012) , 10.1145/2207676.2208544
Suleiman Y Yerima, Implementation and Evaluation of Measurement-Based Admission Control Schemes Within a Converged Networks QoS Management Framework International Journal of Computer Networks & Communications. ,vol. 3, pp. 137- 152 ,(2011) , 10.5121/IJCNC.2011.3410
Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, Ian Oakley, CASA: context-aware scalable authentication symposium on usable privacy and security. pp. 3- ,(2013) , 10.1145/2501604.2501607
Mohammad Tamviruzzaman, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Casey O'brien, ePet: when cellular phone learns to recognize its owner Proceedings of the 2nd ACM workshop on Assurable and usable security configuration. pp. 13- 18 ,(2009) , 10.1145/1655062.1655066