skip to main content
10.1145/3265863.3265873acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices

Published: 25 October 2018 Publication History

Abstract

In this paper, we propose a new continuous verification platform on smart mobile devices. To this end, we integrate gesture-based features with interaction with social networking apps to verify user identities without minimum requirement for a password, pin code or biometric means. The continuous verification subsystem of this work proposes a novel two-step system for verification of users. The subsystem works by having two accurate models working as a primary and backup; when the primary fails the backup takes over to confirm or deny the conclusion of the primary model. The false acceptance rate (FAR) and false rejection rate (FRR) achieved under the proposed two-step system are shown to be 2.54% and 1.98% respectively, compared to the FAR and FRR of single-step verification, which achieved 3.15% and 9.13% respectively. Furthermore, the proposed system also improves the stability of continuous verification. In this work we show that the single step systems are inconsistent when analyzing small feature sets or slightly varied datasets. During both of these instances, the proposed system stays consistent, maintaining a high verification rate.

References

[1]
2018. Z. I. Rauen, "Improving the role of Human-Computer Interaction in Continuous User Verification in Smartphone Sensing. MSc Thesis, Clarkson University. (2018).
[2]
Ethem Alpaydin. 2014. Introduction to Machine Learning. ISBN: 978-0--262-028189, MIT Press.
[3]
K. Altun. 2012. Machine learning methods for human-computer interaction {tutorial}. In IEEE Haptics Symposium (HAPTICS). 1--3.
[4]
F. Anjomshoa, M. Aloqaily, B. Kantarci, M. Erol-Kantarci, and S. Schuckers. 2017. Social Behaviometrics for Personalized Devices in the Internet of Things Era. IEEE Access 5 (2017), 12199--12213.
[5]
F. Anjomshoa, M. Catalfamo, D. Hecker, N. Helgeland, A. Rasch, B. Kantarci, M. Erol-Kantarci, and S. Schuckers. 2016. Mobile behaviometric framework for sociability assessment and identification of smartphone users. In IEEE Symp. on Computers and Communication (ISCC). 1084--1089.
[6]
F. Anjomshoa and B. Kantarci. 2018. SOBER-MCS: Sociability-Oriented and Battery Efficient Recruitment for Mobile Crowd-Sensing. Sensors 18, 5 (2018), 1593.
[7]
F. Anjomshoa, B. Kantarci, M. Erol-Kantarci, and S. Schuckers. 2016. A mobile platform for sociability-based continuous identification. In 2016 IEEE 21st International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD). 149--151.
[8]
S. Bu, F. R. Yu, X. P. Liu, and H. Tang. 2011. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks. IEEE Trans. on Wireless Communications 10, 9 (Sep. 2011), 3064--3073.
[9]
A. Ceccarelli, L. Montecchi, F. Brancati, P. Lollini, A. Marguglio, and A. Bondavalli. 2015. Continuous and Transparent User Identity Verification for Secure Internet Services. IEEE Trans. on Dependable and Secure Computing 12, 3 (2015), 270--283.
[10]
Paul Giura, Ilona Murynets, Roger Piqueras Jover, and Yevgeniy Vahlis. {n. d.}. Is It Really You?: User Identification via Adaptive Behavior Fingerprinting. In ACM Conf. on Data and Application Security and Privacy.
[11]
J. Huang, D. Hou, S. Schuckers, and Z. Hou. 2015. Effect of data size on performance of free-text keystroke authentication. In IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015). 1--7.
[12]
John Leggett, Glen Williams, Mark Usnick, and Mike Longnecker. 1991. Dynamic identity verification via keystroke characteristics. International Journal of ManMachine Studies 35, 6 (1991), 859 -- 870.
[13]
J Scott Long and Jeremy Freese. 2006. Regression models for categorical dependent variables using Stata. Stata press.
[14]
P. A.K. Lorimer, V. M-F. Diec, and B. Kantarci. 2018. COVERS-UP: Collaborative Verification of Smart User Profiles for social sustainability of smart cities. Sustainable Cities and Society 38 (2018), 348 -- 358.
[15]
L. Lu and Y. Liu. 2015. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics. IEEE Trans. Computational Social Sys. 2, 3 (Sep. 2015), 53--64.
[16]
Y. Meng, D. S. Wong, R. Schlegel, et al. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In International Conference on Information Security and Cryptology. Springer, 331--350.
[17]
NEXTCON. 2018. Dual Dataset. (2018). http://nextconlab.academy/CITER2/DualDataset.zip
[18]
M. Pouryazdan, C. Fiandrino, B. Kantarci, D. Kliazovich, T. Soyata, and P. Bouvry. 2016. Game-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications. In IEEE Global Communications Conference (GLOBECOM) Workshops.
[19]
M. Pouryazdan and B. Kantarci. 2016. The smart citizen factor in trustworthy smart city crowdsensing. IT Professional 18, 4 (2016), 26--33.
[20]
M. Pouryazdan, B. Kantarci, T. Soyata, L. Foschini, and H. Song. 2017. Quantifying User Reputation Scores, Data Trustworthiness, and User Incentives in Mobile Crowd-Sensing. IEEE Access 5 (2017), 1382--1397.
[21]
M. Pouryazdan, B. Kantarci, T. Soyata, and H. Song. 2016. Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing. IEEE Access 4 (2016), 529--541.
[22]
A. Ramadan, H. Hemeda, and A. Sarhan. 2017. Touch-input based continuous authentication using gesture-level and session-level features. In 8th IEEE Information Tech., Electronics and Mobile Communication Conf. (IEMCON). 222--229.
[23]
Mike Sharples. 1996. Chapter 10 - Human-Computer Interaction. In Artificial Intelligence, Margaret A. Boden (Ed.). Academic Press, San Diego, 293 -- 323.
[24]
C. Shen, Z. Cai, X. Liu, X. Guan, and R. A. Maxion. 2016. MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Transactions on Human-Machine Systems 46, 5 (Oct 2016), 734--748.
[25]
Barbara G Tabachnick and Linda S Fidell. 2007. Using multivariate statistics. Allyn & Bacon/Pearson Education.
[26]
E. Vural, J. Huang, D. Hou, and S. Schuckers. 2014. Shared research dataset to support development of keystroke authentication. In IEEE International Joint Conference on Biometrics. 1--8.
[27]
N. Zheng, K. Bai, H. Huang, and H. Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In IEEE Intl. Conf. on Network Protocols (ICNP). IEEE, 221--232.

Cited By

View all
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • (2022)WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart CitySensors10.3390/s2218698022:18(6980)Online publication date: 15-Sep-2022
  • (2022)Risk-aware Fine-grained Access Control in Cyber-physical ContextsDigital Threats: Research and Practice10.1145/34804683:4(1-29)Online publication date: 5-Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiWac'18: Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access
October 2018
140 pages
ISBN:9781450359627
DOI:10.1145/3265863
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. behaviometrics
  2. gesture recognition
  3. machine learning
  4. social networks
  5. user profiling

Qualifiers

  • Research-article

Funding Sources

Acceptance Rates

Overall Acceptance Rate 83 of 272 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)77
  • Downloads (Last 6 weeks)11
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • (2022)WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart CitySensors10.3390/s2218698022:18(6980)Online publication date: 15-Sep-2022
  • (2022)Risk-aware Fine-grained Access Control in Cyber-physical ContextsDigital Threats: Research and Practice10.1145/34804683:4(1-29)Online publication date: 5-Dec-2022
  • (2022)A Siamese Neural Network for Scalable Behavioral Biometrics AuthenticationApplied Cryptography and Network Security Workshops10.1007/978-3-031-16815-4_28(515-535)Online publication date: 24-Sep-2022
  • (2021)Security, Privacy, and Usability in Continuous Authentication: A SurveySensors10.3390/s2117596721:17(5967)Online publication date: 6-Sep-2021
  • (2021)Continuous Mobile User Authentication Using Combined Biometric TraitsApplied Sciences10.3390/app11241175611:24(11756)Online publication date: 10-Dec-2021
  • (2021)Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary SurveyIEEE Internet of Things Journal10.1109/JIOT.2020.30200768:1(65-84)Online publication date: 1-Jan-2021
  • (2019)Contextual, Behavioral, and Biometric Signatures for Continuous AuthenticationIEEE Internet Computing10.1109/MIC.2019.294139123:5(18-28)Online publication date: 18-Dec-2019
  • (undefined)Sensory Data-Driven Modeling of Adversaries in Mobile Crowdsensing Platforms2019 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM38437.2019.9014288(1-6)

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media