Skip to main content

Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones

  • Conference paper
  • First Online:
Biometric Recognition (CCBR 2018)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 10996))

Included in the following conference series:

Abstract

Analyzing smartphone users’ behavioral characteristics for recognizing the identities has received growing interest from security and biometric researchers. Extant smartphone authentication methods usually provide one-time identity verification in some specific applications, but the authenticated user is still subject to masquerader attacks or session hijacking. This paper presents a novel smartphone authentication approach by analyzing multi-source user-machine usage behavior (i.e., power consumption, physical sensors, and touchscreen interactions), which can continuously verify the presence of a smartphone user. Extensive experiments are conducted to show that our authentication approach can be up to a relatively high accuracy with an equal-error rate of 5.5%. This approach can also be seamlessly integrated with existing authentication methods, which does not need additional hardware and is transparent to users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Know your enemy: the risk of unauthorized access in smartphones by insiders. In: Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, pp. 271–280. ACM, New York (2013)

    Google Scholar 

  2. Karlson, A.K., Brush, A.B., Schechter, S.: Can I borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2009, pp. 1647–1650. ACM (2009)

    Google Scholar 

  3. Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 806–815 (2009)

    Article  Google Scholar 

  4. Papadopoulos, S., Yang, Y., Papadias, D.: Continuous authentication on relational streams. J. VLDB. 19(2), 161–180 (2010)

    Article  Google Scholar 

  5. Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Fore. Secur. 8(1), 136–148 (2013)

    Article  Google Scholar 

  6. Shen, C., Cai, Z., Guan, X.: Continuous authentication for mouse dynamics: a pattern-growth approach. In: Proceedings of IEEE/IFIP DSN (2012)

    Google Scholar 

  7. Clarke, N., Furnell, S.: Advanced user authentication for mobiledevices. Comput. Secur. 26(2), 109–119 (2007)

    Article  Google Scholar 

  8. Tsapeli, F., Musolesi, M.: Investigating causality in human behavior from smartphone sensor data: a quasi-experimental approach. EPJ Data Sci. 4(1) (2015)

    Google Scholar 

  9. Yu, C.C.: Degradation model for device reliability. In: Proceedings of 18th International Reliability Physics Symposium, pp. 52–54 (1980)

    Google Scholar 

  10. Damera-Venkata, N., Kite, T.D., Geisler, W.S., Evans, B.L., Bovik, A.C.: Image quality assessment based on a degradation model. IEEE Trans. Image Process. 9(4), 636–650 (2000)

    Article  Google Scholar 

  11. Hu, C., Tam, S.C., Hsu, F.C., Ko, P.K., Chan, T.Y., Terrill, K.W.: Hot-electron-induced MOSFET degradation-model, monitor, and improvement. IEEE Trans. Electron Devices ED-32, 375–385 (1985)

    Google Scholar 

  12. Murmuria, R., Stavrou, A., Barbará, D., Fleck, D.: Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 405–424. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_19

    Chapter  Google Scholar 

  13. Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. J. Inform. Sci. 201(19), 19–36 (2012)

    Article  Google Scholar 

  14. Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. J. IEEE Commun. Surv. Tutorials 1998–2026 (2016)

    Google Scholar 

  15. [Online]. https://en.wikipedia.org/wiki/Feature_scaling

  16. Moya, M., Hush, D.: Network constraints and multi-objective optimization for one-class classification. J. Neural Netw. 9(3), 463–474 (1996)

    Article  Google Scholar 

  17. Poggio, T., Torre, V., Koch, C.: Computational vision and regularization theory. Nature 317(6035), 314–319 (1985)

    Article  Google Scholar 

  18. Provencher, S.: A constrained regularization method for inverting data represented by linear algebraic or integral equations. Comput. Phys. Commun. 27(3), 213–227 (1982)

    Article  Google Scholar 

  19. Poggio, T., Girosi, F.: Regularization algorithms for learning that are equivalent to multilayer networks. Science 247(4945), 978 (1990)

    Article  MathSciNet  Google Scholar 

  20. Jones, M., Poggio, T.: Regularization theory and neural networks architectures. Neural Comput. 7(2), 219–269 (1995)

    Article  Google Scholar 

  21. Castanedo, F.: A review of data fusion techniques. Sci. World J. 2013, 1–19 (2013)

    Article  Google Scholar 

  22. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3) (2011)

    Google Scholar 

Download references

Acknowledgments

This research was supported in part by National Natural Science Foundation of China (U1736205, 61773310, 61403301), China Postdoctoral Science Foundation (2014M560783), Special Foundation of China Postdoctoral Science (2015T81032), Natural Science Foundation of Shaanxi Province (2015JQ6216), Application Foundation Research Program of SuZhou (SYG201444), Open Projects Program of National Laboratory of Pattern Recognition, and Fundamental Research Funds for the Central Universities (xjj2015115). Chao Shen is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, X., Shen, C., Chen, Y. (2018). Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones. In: Zhou, J., et al. Biometric Recognition. CCBR 2018. Lecture Notes in Computer Science(), vol 10996. Springer, Cham. https://doi.org/10.1007/978-3-319-97909-0_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-97909-0_71

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-97908-3

  • Online ISBN: 978-3-319-97909-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics