Motion-senor behavior analysis for continuous authentication on smartphones

Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system th...

Full description

Saved in:
Bibliographic Details
Published in2016 12th World Congress on Intelligent Control and Automation (WCICA) pp. 2023 - 2028
Main Authors Chao Shen, Yunpeng Li, Tianwen Yu, Sheng Yuan, Xiao Yi, Xiaohong Guan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2016
Subjects
Online AccessGet full text
DOI10.1109/WCICA.2016.7578519

Cover

Abstract Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system that continuously verifies the presence of a smartphone user. When a user touches the smartphone screen, motion-sensor data are extracted and analyzed to obtain descriptive features for accurately depicting users' touch habit and rhythm. Then a one-class learning algorithm is employed in the feature space to perform the continuous authentication task. Based on touch-tapping data collected from over 50 users, we conduct a series of experiments to validate the efficacy of our proposed approach. Our experimental results show that our verification system achieves a relatively high accuracy with an equal-error rate of 11.05%. Additional experiment on usability to the observation window size is provided to further examine the effectiveness. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is non-intrusive to users and does not need extra hardware.
AbstractList Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. This paper presents a framework and performance analysis of a sensor-based smartphone authentication system that continuously verifies the presence of a smartphone user. When a user touches the smartphone screen, motion-sensor data are extracted and analyzed to obtain descriptive features for accurately depicting users' touch habit and rhythm. Then a one-class learning algorithm is employed in the feature space to perform the continuous authentication task. Based on touch-tapping data collected from over 50 users, we conduct a series of experiments to validate the efficacy of our proposed approach. Our experimental results show that our verification system achieves a relatively high accuracy with an equal-error rate of 11.05%. Additional experiment on usability to the observation window size is provided to further examine the effectiveness. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is non-intrusive to users and does not need extra hardware.
Author Chao Shen
Sheng Yuan
Tianwen Yu
Xiao Yi
Yunpeng Li
Xiaohong Guan
Author_xml – sequence: 1
  surname: Chao Shen
  fullname: Chao Shen
  email: cshen@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 2
  surname: Yunpeng Li
  fullname: Yunpeng Li
  email: ypli.chn@qq.com
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 3
  surname: Tianwen Yu
  fullname: Tianwen Yu
  email: twyu@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 4
  surname: Sheng Yuan
  fullname: Sheng Yuan
  email: ypli.chn@qq.com
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 5
  surname: Xiao Yi
  fullname: Xiao Yi
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
– sequence: 6
  surname: Xiaohong Guan
  fullname: Xiaohong Guan
  email: xhguan@sei.xjtu.edu.cn
  organization: MOE Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China
BookMark eNotj81qwzAQhFVoD03aF2gvfgG7K8urn2Mx_aMpvQR6DLKywoJUCpZdyNtXpYGBne-wuzMrdhlTJMbuODScg3n46t_6x6YFLhuFSiM3F2zFEQy0AjVes_ePNIcU60wxTdVAo_0JxdhoD6cccuULuBTnEJe05Mou80iFnP3bqoryt53m41je5ht25e0h0-15rtn2-Wnbv9abz5cSY1MHA3Ot0bWKHA0kDaEiwbUHL6kbwNlhvyfwnXGdQnRkte8kkrQKvBPcSy20WLP7_7OBiHbHKZQEp925nvgFKppMiQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WCICA.2016.7578519
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1509023585
9781467384148
9781509023585
1467384143
EndPage 2028
ExternalDocumentID 7578519
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-85c27ecebe69e57e318f0f6e4b0cabdde0f49c4755cea8f465e6a70fc31f68383
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:49 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-85c27ecebe69e57e318f0f6e4b0cabdde0f49c4755cea8f465e6a70fc31f68383
PageCount 6
ParticipantIDs ieee_primary_7578519
PublicationCentury 2000
PublicationDate 2016-June
PublicationDateYYYYMMDD 2016-06-01
PublicationDate_xml – month: 06
  year: 2016
  text: 2016-June
PublicationDecade 2010
PublicationTitle 2016 12th World Congress on Intelligent Control and Automation (WCICA)
PublicationTitleAbbrev WCICA
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6123133
Snippet Existing smartphone authentication methods (e.g., PIN) typically provide one-time identity verification, but the verified user is still subject to session...
SourceID ieee
SourceType Publisher
StartPage 2023
SubjectTerms Accelerometers
Authentication
Feature extraction
Gravity
Gyroscopes
Sensors
Smart phones
Title Motion-senor behavior analysis for continuous authentication on smartphones
URI https://ieeexplore.ieee.org/document/7578519
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_ibHDyaLm3zoz3KcExl4mHibiPJXmCInWztxb_evLabKB6EHEIoScgLecnr932PkGufJhazi7IcNEdKDjCTpJrlCcjUpxDuJEgUnjyp8Yt4mMlZh9zsuDAAUIPPIMJq_S9_sXIVhsoGqL0uUeNzT2eq4WpteTA8H7wO74e3CNZSUfvhj4wptcMYHZDJdqgGJ_IWVaWN3OcvFcb_zuWQ9L-pefR553SOSAeKHnmc1Ll42AaK1ZpumffUtIIjNFxMKWLSl0UVHvrUIKq9KNtoHQ1l8x52EKLUYdMn09HddDhmbZYEtsx5yTLpEg0u2ELlIDWGND33CoTlzthweHEvcie0lA5M5oWSoIzm3qWxV1l4nx6TbhG6PyE0dj7LnJNSeisWoI1IYCFi7bWziY_TU9LDdZh_NDoY83YJzv5uPif7aIsGVnVBuuW6gsvgwEt7VVvuC2c2oGM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5DD3pS2cTf5uDRdGmbH-1RhmNz6_AwcbeRZC8wxE629uJfb9J2E8WDkEMIJQl5IS95_b7vIXRn40j77KIkBUk9JQeIimJJ0gh4bGNwdxJPFM4mYvDCnmZ81kL3Oy4MAFTgMwh8tfqXv1iZ0ofKul57nXuNz33OGOM1W2vLhKFp97U37D14uJYImk9_5EypXEb_CGXbwWqkyFtQFjown790GP87m2PU-Sbn4eed2zlBLcjbaJRV2XjIBvLVGm-591g1kiPYXU2xR6Uv89I99bHyuPa8aOJ12JXNu9tDHqcOmw6a9h-nvQFp8iSQZUoLknATSTDOGiIFLn1Q01IrgGlqlHbHF7UsNUxybkAllgkOQklqTRxakbgX6inay133ZwiHxiaJMZxzq9kCpGIRLFgorTQ6smF8jtp-HeYftRLGvFmCi7-bb9HBYJqN5-PhZHSJDr1dapDVFdor1iVcO3de6JvKil_346Ow
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+12th+World+Congress+on+Intelligent+Control+and+Automation+%28WCICA%29&rft.atitle=Motion-senor+behavior+analysis+for+continuous+authentication+on+smartphones&rft.au=Chao+Shen&rft.au=Yunpeng+Li&rft.au=Tianwen+Yu&rft.au=Sheng+Yuan&rft.date=2016-06-01&rft.pub=IEEE&rft.spage=2023&rft.epage=2028&rft_id=info:doi/10.1109%2FWCICA.2016.7578519&rft.externalDocID=7578519