Modeling interactive sensor-behavior with smartphones for implicit and active user authentication

While the public enjoy the convenience aroused by the proliferation of the smartphones, they also face the risk of exposing their sensitive and secure information to attackers. Extant smartphone authentication methods (e.g., PIN and fingerprint) typically provide one-time identity verification, but...

Full description

Saved in:
Bibliographic Details
Published in2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) pp. 1 - 6
Main Authors Chen, Yufei, Shen, Chao, Wang, Zhao, Yu, Tianwen
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2017
Subjects
Online AccessGet full text
DOI10.1109/ISBA.2017.7947694

Cover

Abstract While the public enjoy the convenience aroused by the proliferation of the smartphones, they also face the risk of exposing their sensitive and secure information to attackers. Extant smartphone authentication methods (e.g., PIN and fingerprint) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. In this paper, we propose a framework and performance analysis of using onboard-sensor behavior for continuous user authentication on smartphones, which can implicitly and continuously verifies the presence of a smartphone user. When a user carries the smartphone to do daily activities, time-, frequency- and wavelet-domain features are extracted from smartphone sensor data for accurately depicting users' motion patterns. A decision procedure based on one-class learning algorithms is developed and employed in the feature space to perform the continuous authentication task. Analyses are conducted based on sensor-interaction data on five typical daily activities with 27,681 samples across five phonecarrying positions. Extensive experiments in two specific scenarios are included to examine the efficacy of the proposed approach, which achieves a relatively high accuracy with the equal-error rate achieves 2.40% and 5.50% respectively. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is nonintrusive to users and does not need extra hardware.
AbstractList While the public enjoy the convenience aroused by the proliferation of the smartphones, they also face the risk of exposing their sensitive and secure information to attackers. Extant smartphone authentication methods (e.g., PIN and fingerprint) typically provide one-time identity verification, but the verified user is still subject to session hijacking or masquerading attacks. In this paper, we propose a framework and performance analysis of using onboard-sensor behavior for continuous user authentication on smartphones, which can implicitly and continuously verifies the presence of a smartphone user. When a user carries the smartphone to do daily activities, time-, frequency- and wavelet-domain features are extracted from smartphone sensor data for accurately depicting users' motion patterns. A decision procedure based on one-class learning algorithms is developed and employed in the feature space to perform the continuous authentication task. Analyses are conducted based on sensor-interaction data on five typical daily activities with 27,681 samples across five phonecarrying positions. Extensive experiments in two specific scenarios are included to examine the efficacy of the proposed approach, which achieves a relatively high accuracy with the equal-error rate achieves 2.40% and 5.50% respectively. Our authentication system can be seamlessly integrated with extant smartphone authentication mechanisms, and is nonintrusive to users and does not need extra hardware.
Author Yu, Tianwen
Wang, Zhao
Shen, Chao
Chen, Yufei
Author_xml – sequence: 1
  givenname: Yufei
  surname: Chen
  fullname: Chen, Yufei
  email: yfchen@sei.xjtu.edu.cn
  organization: MOE KLINNS Lab, Xi'an Jiaotong University, China
– sequence: 2
  givenname: Chao
  surname: Shen
  fullname: Shen, Chao
  email: cshen@sei.xjtu.edu.cn
  organization: MOE KLINNS Lab, Xi'an Jiaotong University, China
– sequence: 3
  givenname: Zhao
  surname: Wang
  fullname: Wang, Zhao
  email: zwang@sei.xjtu.edu.cn
  organization: MOE KLINNS Lab, Xi'an Jiaotong University, China
– sequence: 4
  givenname: Tianwen
  surname: Yu
  fullname: Yu, Tianwen
  email: twyu@sei.xjtu.edu.cn
  organization: MOE KLINNS Lab., Xi'an Jiaotong Univ., Xi'an, China
BookMark eNotT91KwzAYjaAXOvcA4k1eoDVZ0qa5nMOfwcQLdz--tF_sB106kmzi21uwnIsDB87fHbsOY0DGHqQopRT2afv1vC5XQprSWG1qq6_Y0ppGVsKKqrIrccvgY-xwoPDNKWSM0Ga6IE8Y0hgLhz1caIz8h3LP0xFiPvVTReJ-Eul4GqilzCF0fDaeE0YO59xjyNRCpjHcsxsPQ8LlzAu2f33Zb96L3efbdrPeFWRFLlA6Zb2ddukKTIuyUQYmoHVWeHCqBomoZduB0xpV3XhvZNMo75vauE4t2ON_LCHi4RRpWvt7mH-rP2SjVMA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISBA.2017.7947694
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781509055920
1509055924
EndPage 6
ExternalDocumentID 7947694
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-e1b39f990545a7ce1837a7a7e9b90fab36a1ee41cdab44e368ff71883ff867bd3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:55 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-e1b39f990545a7ce1837a7a7e9b90fab36a1ee41cdab44e368ff71883ff867bd3
PageCount 6
ParticipantIDs ieee_primary_7947694
PublicationCentury 2000
PublicationDate 2017-Feb.
PublicationDateYYYYMMDD 2017-02-01
PublicationDate_xml – month: 02
  year: 2017
  text: 2017-Feb.
PublicationDecade 2010
PublicationTitle 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)
PublicationTitleAbbrev ISBA
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6704613
Snippet While the public enjoy the convenience aroused by the proliferation of the smartphones, they also face the risk of exposing their sensitive and secure...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accelerometers
Authentication
Detectors
Feature extraction
Pins
Smart phones
Title Modeling interactive sensor-behavior with smartphones for implicit and active user authentication
URI https://ieeexplore.ieee.org/document/7947694
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA7bTp5UNvE3OXg0XbKmSXNUcUxhIjhht5EfLzDETrZuB_96k7abKB6kl1BSGvLSfOl73_ceQlfWKpk5nxGujCJcM0MMUBM2Q269YwPmVRQ4j5_E6JU_TrNpC13vtDAAUJHPIInNKpbvFnYdXWX9sHakULyN2jIXtVarCVQyqvoPL7c3kaslk6bfj4IpFV4M99F4-6aaJvKWrEuT2M9fSRj_O5QD1PtW5uHnHeYcohYUXaRjQbMoK8cx-UMle9oAXoUf1MWSbHX4OHpc8eo9LJVIR4cVDsdVPK8I5fMS68Lh5sHot8A6Mt-LsvHo9dBkeD-5G5GmdAKZK1oSYCZVPgBNOB9paSF8t1KHC4JBqNcmFZoBcGadNpxDKnLvA0jlqfe5kMalR6hThKEcI0yVpNyJ3GjqeEZtbqzJfIzm2WxAhTpB3Tg7s486OcasmZjTv2-fob1ooZr2fI465XINFwHVS3NZmfMLcfOoCw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRh_24NHBx1rt_WoRgIKxERMuJH-eE2IcRgYHvzrbbeB0XgwuzRLlzV9Xb_uve97D-BKa5FwY3nAhBIBk6EKFFLlNkOmrQk7oRVe4Dwcxb0X9jDhkxpcb7QwiFiQz7Dlm0Us38z1yrvK2m7tJLFgW7DNGWO8VGtVocqQinb_-fbGs7WSVtXzR8mUAjG6ezBcv6skiry2Vrlq6c9faRj_O5h9aH5r88jTBnUOoIZZA6QvaeaF5cSnfyiETx9Ilu4Xdb4I1kp84n2uZPnmFosnpOOSuAMrmRWU8llOZGZI9aD3XBDpue9ZXvn0mjDu3o_vekFVPCGYCZoHGKpIWAc17oQkE43uy02ku9CZhFqpoliGiCzURirGMIpTax1MpZG1aZwoEx1CPXNDOQJCRUKZiVMlqWGc6lRpxa2P52neobE4hoafnel7mR5jWk3Myd-3L2GnNx4OpoP-6PEUdr21ShL0GdTzxQrPHcbn6qIw7Rdo_qtY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+IEEE+International+Conference+on+Identity%2C+Security+and+Behavior+Analysis+%28ISBA%29&rft.atitle=Modeling+interactive+sensor-behavior+with+smartphones+for+implicit+and+active+user+authentication&rft.au=Chen%2C+Yufei&rft.au=Shen%2C+Chao&rft.au=Wang%2C+Zhao&rft.au=Yu%2C+Tianwen&rft.date=2017-02-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FISBA.2017.7947694&rft.externalDocID=7947694