Motion-senor behavior analysis for continuous authentication on smartphones
Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system th...
        Saved in:
      
    
          | Published in | 2016 12th World Congress on Intelligent Control and Automation (WCICA) pp. 2023 - 2028 | 
|---|---|
| Main Authors | , , , , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.06.2016
     | 
| Subjects | |
| Online Access | Get full text | 
| DOI | 10.1109/WCICA.2016.7578519 | 
Cover
| Abstract | Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system that continuously verifies the presence of a smartphone user. When a user touches the smartphone screen, motion-sensor data are extracted and analyzed to obtain descriptive features for accurately depicting users' touch habit and rhythm. Then a one-class learning algorithm is employed in the feature space to perform the continuous authentication task. Based on touch-tapping data collected from over 50 users, we conduct a series of experiments to validate the efficacy of our proposed approach. Our experimental results show that our verification system achieves a relatively high accuracy with an equal-error rate of 11.05%. Additional experiment on usability to the observation window size is provided to further examine the effectiveness. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is non-intrusive to users and does not need extra hardware. | 
    
|---|---|
| AbstractList | Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system that continuously verifies the presence of a smartphone user. When a user touches the smartphone screen, motion-sensor data are extracted and analyzed to obtain descriptive features for accurately depicting users' touch habit and rhythm. Then a one-class learning algorithm is employed in the feature space to perform the continuous authentication task. Based on touch-tapping data collected from over 50 users, we conduct a series of experiments to validate the efficacy of our proposed approach. Our experimental results show that our verification system achieves a relatively high accuracy with an equal-error rate of 11.05%. Additional experiment on usability to the observation window size is provided to further examine the effectiveness. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is non-intrusive to users and does not need extra hardware. | 
    
| Author | Chao Shen Sheng Yuan Tianwen Yu Xiao Yi Yunpeng Li Xiaohong Guan  | 
    
| Author_xml | – sequence: 1 surname: Chao Shen fullname: Chao Shen email: cshen@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 2 surname: Yunpeng Li fullname: Yunpeng Li email: ypli.chn@qq.com organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 3 surname: Tianwen Yu fullname: Tianwen Yu email: twyu@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 4 surname: Sheng Yuan fullname: Sheng Yuan email: ypli.chn@qq.com organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 5 surname: Xiao Yi fullname: Xiao Yi organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China – sequence: 6 surname: Xiaohong Guan fullname: Xiaohong Guan email: xhguan@sei.xjtu.edu.cn organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China  | 
    
| BookMark | eNotj81qwzAQhFVoD03aF2gvfgG7K8urn2Mx_aMpvQR6DLKywoJUCpZdyNtXpYGBne-wuzMrdhlTJMbuODScg3n46t_6x6YFLhuFSiM3F2zFEQy0AjVes_ePNIcU60wxTdVAo_0JxdhoD6cccuULuBTnEJe05Mou80iFnP3bqoryt53m41je5ht25e0h0-15rtn2-Wnbv9abz5cSY1MHA3Ot0bWKHA0kDaEiwbUHL6kbwNlhvyfwnXGdQnRkte8kkrQKvBPcSy20WLP7_7OBiHbHKZQEp925nvgFKppMiQ | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/WCICA.2016.7578519 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISBN | 1509023585 9781467384148 9781509023585 1467384143  | 
    
| EndPage | 2028 | 
    
| ExternalDocumentID | 7578519 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IL CBEJK RIE RIL  | 
    
| ID | FETCH-LOGICAL-i90t-85c27ecebe69e57e318f0f6e4b0cabdde0f49c4755cea8f465e6a70fc31f68383 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Thu Jun 29 18:37:49 EDT 2023 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i90t-85c27ecebe69e57e318f0f6e4b0cabdde0f49c4755cea8f465e6a70fc31f68383 | 
    
| PageCount | 6 | 
    
| ParticipantIDs | ieee_primary_7578519 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2016-June | 
    
| PublicationDateYYYYMMDD | 2016-06-01 | 
    
| PublicationDate_xml | – month: 06 year: 2016 text: 2016-June  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2016 12th World Congress on Intelligent Control and Automation (WCICA) | 
    
| PublicationTitleAbbrev | WCICA | 
    
| PublicationYear | 2016 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| Score | 1.6123133 | 
    
| Snippet | Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 2023 | 
    
| SubjectTerms | Accelerometers Authentication Feature extraction Gravity Gyroscopes Sensors Smart phones  | 
    
| Title | Motion-senor behavior analysis for continuous authentication on smartphones | 
    
| URI | https://ieeexplore.ieee.org/document/7578519 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDyaLm3zoz3KcExl4mHibiPJXmCInWztxb_evLabKB6EHEIoScgLecnr932PkGufJhazi7IcNEdKDjCTpJrlCcjUpxDuJEgUnjyp8Yt4mMlZh9zsuDAAUIPPIMJq_S9_sXIVhsoGqL0uUeNzT2eq4WpteTA8H7wO74e3CNZSUfvhj4wptcMYHZDJdqgGJ_IWVaWN3OcvFcb_zuWQ9L-pefR553SOSAeKHnmc1Ll42AaK1ZpumffUtIIjNFxMKWLSl0UVHvrUIKq9KNtoHQ1l8x52EKLUYdMn09HddDhmbZYEtsx5yTLpEg0u2ELlIDWGND33CoTlzthweHEvcie0lA5M5oWSoIzm3qWxV1l4nx6TbhG6PyE0dj7LnJNSeisWoI1IYCFi7bWziY_TU9LDdZh_NDoY83YJzv5uPif7aIsGVnVBuuW6gsvgwEt7VVvuC2c2oGM | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5DD3pS2cTf5uDRdGmbH-1RhmNz6_AwcbeRZC8wxE629uJfb9J2E8WDkEMIJQl5IS95_b7vIXRn40j77KIkBUk9JQeIimJJ0gh4bGNwdxJPFM4mYvDCnmZ81kL3Oy4MAFTgMwh8tfqXv1iZ0ofKul57nXuNz33OGOM1W2vLhKFp97U37D14uJYImk9_5EypXEb_CGXbwWqkyFtQFjown790GP87m2PU-Sbn4eed2zlBLcjbaJRV2XjIBvLVGm-591g1kiPYXU2xR6Uv89I99bHyuPa8aOJ12JXNu9tDHqcOmw6a9h-nvQFp8iSQZUoLknATSTDOGiIFLn1Q01IrgGlqlHbHF7UsNUxybkAllgkOQklqTRxakbgX6inay133ZwiHxiaJMZxzq9kCpGIRLFgorTQ6smF8jtp-HeYftRLGvFmCi7-bb9HBYJqN5-PhZHSJDr1dapDVFdor1iVcO3de6JvKil_346Ow | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+12th+World+Congress+on+Intelligent+Control+and+Automation+%28WCICA%29&rft.atitle=Motion-senor+behavior+analysis+for+continuous+authentication+on+smartphones&rft.au=Chao+Shen&rft.au=Yunpeng+Li&rft.au=Tianwen+Yu&rft.au=Sheng+Yuan&rft.date=2016-06-01&rft.pub=IEEE&rft.spage=2023&rft.epage=2028&rft_id=info:doi/10.1109%2FWCICA.2016.7578519&rft.externalDocID=7578519 |