Abstract
Analyzing smartphone users’ behavioral characteristics for recognizing the identities has received growing interest from security and biometric researchers. Extant smartphone authentication methods usually provide one-time identity verification in some specific applications, but the authenticated user is still subject to masquerader attacks or session hijacking. This paper presents a novel smartphone authentication approach by analyzing multi-source user-machine usage behavior (i.e., power consumption, physical sensors, and touchscreen interactions), which can continuously verify the presence of a smartphone user. Extensive experiments are conducted to show that our authentication approach can be up to a relatively high accuracy with an equal-error rate of 5.5%. This approach can also be seamlessly integrated with existing authentication methods, which does not need additional hardware and is transparent to users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Know your enemy: the risk of unauthorized access in smartphones by insiders. In: Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services, pp. 271–280. ACM, New York (2013)
Karlson, A.K., Brush, A.B., Schechter, S.: Can I borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2009, pp. 1647–1650. ACM (2009)
Liu, J., Yu, F.R., Lung, C.-H., Tang, H.: Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 806–815 (2009)
Papadopoulos, S., Yang, Y., Papadias, D.: Continuous authentication on relational streams. J. VLDB. 19(2), 161–180 (2010)
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Fore. Secur. 8(1), 136–148 (2013)
Shen, C., Cai, Z., Guan, X.: Continuous authentication for mouse dynamics: a pattern-growth approach. In: Proceedings of IEEE/IFIP DSN (2012)
Clarke, N., Furnell, S.: Advanced user authentication for mobiledevices. Comput. Secur. 26(2), 109–119 (2007)
Tsapeli, F., Musolesi, M.: Investigating causality in human behavior from smartphone sensor data: a quasi-experimental approach. EPJ Data Sci. 4(1) (2015)
Yu, C.C.: Degradation model for device reliability. In: Proceedings of 18th International Reliability Physics Symposium, pp. 52–54 (1980)
Damera-Venkata, N., Kite, T.D., Geisler, W.S., Evans, B.L., Bovik, A.C.: Image quality assessment based on a degradation model. IEEE Trans. Image Process. 9(4), 636–650 (2000)
Hu, C., Tam, S.C., Hsu, F.C., Ko, P.K., Chan, T.Y., Terrill, K.W.: Hot-electron-induced MOSFET degradation-model, monitor, and improvement. IEEE Trans. Electron Devices ED-32, 375–385 (1985)
Murmuria, R., Stavrou, A., Barbará, D., Fleck, D.: Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 405–424. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_19
Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. J. Inform. Sci. 201(19), 19–36 (2012)
Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. J. IEEE Commun. Surv. Tutorials 1998–2026 (2016)
Moya, M., Hush, D.: Network constraints and multi-objective optimization for one-class classification. J. Neural Netw. 9(3), 463–474 (1996)
Poggio, T., Torre, V., Koch, C.: Computational vision and regularization theory. Nature 317(6035), 314–319 (1985)
Provencher, S.: A constrained regularization method for inverting data represented by linear algebraic or integral equations. Comput. Phys. Commun. 27(3), 213–227 (1982)
Poggio, T., Girosi, F.: Regularization algorithms for learning that are equivalent to multilayer networks. Science 247(4945), 978 (1990)
Jones, M., Poggio, T.: Regularization theory and neural networks architectures. Neural Comput. 7(2), 219–269 (1995)
Castanedo, F.: A review of data fusion techniques. Sci. World J. 2013, 1–19 (2013)
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3) (2011)
Acknowledgments
This research was supported in part by National Natural Science Foundation of China (U1736205, 61773310, 61403301), China Postdoctoral Science Foundation (2014M560783), Special Foundation of China Postdoctoral Science (2015T81032), Natural Science Foundation of Shaanxi Province (2015JQ6216), Application Foundation Research Program of SuZhou (SYG201444), Open Projects Program of National Laboratory of Pattern Recognition, and Fundamental Research Funds for the Central Universities (xjj2015115). Chao Shen is the corresponding author.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, X., Shen, C., Chen, Y. (2018). Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones. In: Zhou, J., et al. Biometric Recognition. CCBR 2018. Lecture Notes in Computer Science(), vol 10996. Springer, Cham. https://doi.org/10.1007/978-3-319-97909-0_71
Download citation
DOI: https://doi.org/10.1007/978-3-319-97909-0_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97908-3
Online ISBN: 978-3-319-97909-0
eBook Packages: Computer ScienceComputer Science (R0)