Skip to main content

Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm

  • Conference paper
  • First Online:
Book cover Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

  • 1152 Accesses

Abstract

In order to meet the higher security requirements of authentication technology under the current mobile Internet background, continuous identity authentication technology based on single authentication improvement came into being. At present, continuous authentication technology has problems such as low security, low efficiency, and lack of a scientific punishment mechanism. How to efficiently, safely and comprehensively evaluate the legal and illegal requests of the terminal is a huge challenge for continuous authentication. The multi-device continuous authentication mechanism based on homomorphic encryption and SVM algorithm can satisfy the server in a sufficiently secure environment to enable the terminal request to be continuously authenticated. Moreover, based on the existing research, this paper designs a new penalty protocol and applies it to the continuous authentication mechanism. For this purpose, an illegal request processing model is constructed, and the penalty protocol designed to cope with the illegal request Further processing solves the problem that the existing continuous authentication mechanism is insufficient to handle illegal requests and is not humane enough. Finally, the experimental results of SVM and convolutional network on a single device and multiple devices are compared from three dimensions. The comparison of the experimental results verifies the effectiveness of the proposed model and protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gomi, H., Yamaguchi, S., Tsubouchi, K., Sasaya, N.: Continuous authentication system us- ing online activities. In: 2018 17th IEEE International Conference on Trust, Security and Privacy; in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 522–532 (2018)

    Google Scholar 

  2. Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33(4), 49–61 (2016)

    Article  Google Scholar 

  3. Song, X., Zhao, P., Wang, M., Yan, C.: A continuous identity verification method based on free-text keystroke dynamics. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Budapest, Hungary, pp. 000206–000210 (2016)

    Google Scholar 

  4. Messerman, A., Mustafic´, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, USA, pp. 1–8 (2011)

    Google Scholar 

  5. Hernández-Álvarez, L., Fuentes, J.M.D., González-Manzano, L., Encinas, L.H.: SmartCAMPP-Smartphone-based continuous authentication leveraging motion sensors with privacy preservation. Pattern Recogn. Lett. 147, 189–196 (2021)

    Article  Google Scholar 

  6. Sánchez, P.M.S., Maimó, L.F., Celdrán, A.H., Pérez, G.M.: AuthCODE: A privacy- preserving and multi-device continuous authentication architecture based on machine and deep learning. Comput. Secur. 103, 102168 (2021)

    Article  Google Scholar 

  7. Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008–5020 (2020)

    Article  Google Scholar 

  8. Kluczniak, K., Wang, J., Chen, X., Kutyłowski, M.: Multi-device anonymous authentication. Int. J. Inf. Secur. 18(2), 181–197 (2018). https://doi.org/10.1007/s10207-018-0406-4

    Article  Google Scholar 

  9. Samet, S., Ishraque, M.T., Ghadamyari, M., Kakadiya, K., Mistry, Y., Nakkabi, Y.: TouchMetric: a machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 11(4), 625–631 (2019). https://doi.org/10.1007/s41870-019-00306-w

    Article  Google Scholar 

  10. Al-Naji, F.H., Zagrouba, R.: A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 163, 109–133 (2020)

    Article  Google Scholar 

  11. Udandarao, V., Agrawal, M., Kumar, R., Shah, R.R.: On the Inference of Soft Biometrics from Typing Patterns Collected in a Multi-device Environment. In: IEEE Sixth International Conference on Multimedia Big Data (BigMM), New Delhi, India, pp. 76–85 (2020)

    Google Scholar 

  12. Gomi, H., Yamaguchi, S., Ogami, W., Teraoka, T., Higurashi, T.: Context-Aware Authentica- tion Using Co-Located Devices. In: 18th IEEE International Conference on Trust, Security and Privacy; In: Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering, Rotorua, New Zealand, pp. 304–311 (2019)

    Google Scholar 

  13. Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings CCSW, pp. 113–124 (2011)

    Google Scholar 

  14. Ceccarelli, A., Montecchi, L., Brancati, F., Lollini, P., Marguglio, A.: Continuous and trans- parent user identity verification for secure internet services. IEEE Transactions on Depend- able and Secure Computing 12(3), 270–283 (2014)

    Article  Google Scholar 

  15. Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man Mach. Stud. 35(6), 859–870 (1991)

    Article  Google Scholar 

  16. Khan, A.A., Khan, F.A.: A cost-efficient radiation monitoring system for nuclear sites: de- signing and implementation. Intelligent Automation & Soft Computing 32(3), 1357–1367 (2022)

    Article  Google Scholar 

  17. Shao, X.: Accurate multi-site daily-ahead multi-step pm2.5 concentrations forecasting using space-shared cnn-lstm. Computers, Materials & Continua 70(3), 5143–5160 (2022)

    Google Scholar 

  18. Malavika, R., Valarmathi, M.L.: Adaptive server load balancing in sdn using pid neural net- work controller. Comput. Syst. Sci. Eng. 42(1), 229–243 (2022)

    Article  Google Scholar 

  19. Alrajhi, H.: A generalized state space average model for parallel dc-to-dc converters. Com- puter Systems Science and Engineering 41(2), 717–734 (2022)

    Article  Google Scholar 

  20. Ju, X.: An Overview of Face Manipulation Detection. Journal of Cyber Security 2(4), 197–207 (2020)

    Article  Google Scholar 

Download references

Acknowledgement

This work is supported by the State Grid Sichuan Company Science and Technology Project: “Research and Application of Key Technologies of Network Security Protection System Based on Zero Trust Model” (No. SGSCCD00XTJS2101279).

Funding

The authors declare that they have no conflicts of interest to report regarding the present study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gan, W. et al. (2022). Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_49

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics