A Preliminary Study on Non-Intrusive User Authentication Method Using Smartphone Sensors

Article Preview

Abstract:

This paper proposes a non-intrusive authentication method based on two sensitive apparatus of smartphones, namely, the orientation sensor and the touchscreen. We have found that these two sensors are capable of capturing behavioral biometrics of a user while the user is engaged in relatively stationary activities. The experimental results with respect to two types of flick operating have an equal error rate of about 3.5% and 5%, respectively. To the best of our knowledge, this work is the first publicly reported study that simultaneously adopts the orientation sensor and the touchscreen to build an authentication model for smartphone users. Finally, we show that the proposed approach can be used together with existing intrusive mechanisms, such as password and/or fingerprints, to build a more robust authentication framework for smartphone users.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3270-3274

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A.A.E. Ahmed and I. Traore: IEEE T DEPEND SECURE. Vol. 4(3) (2007), p.16.

Google Scholar

[2] F. Bergadano, D. Guneti and C. Picardi: ACM T INFORM SYST SE Vol. 5(4) (2002), p.367.

Google Scholar

[3] R. Bolle, J.H. Connell and N.K. Ratha: Pattern Recognition. Vol. 35 (2002), p.2727.

Google Scholar

[4] M. Conti, I.Z. Zlatea and B. Crispo: Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security, (2011) March 22–24; New York, USA.

Google Scholar

[5] M.O. Derawi, P. Bours and K. Holien: The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (2010) Oct. 15-17; Darmstadt, Germany.

DOI: 10.1109/iihmsp.2010.84

Google Scholar

[6] M.N. Doja and N. Kumar: INFOCOMP Journal of Computer Science. Vol. 7(4) (2008), p.38.

Google Scholar

[7] S. Furnell, N. Clarke and S. Karatzouni: Computer Fraud & Security. Vol. 2008(8) (2008), p.12.

Google Scholar

[8] D. Gafurov, K. Helkala and T. Søndrol: Journal of Computers. Vol. 1 (2006), p.51.

Google Scholar

[9] Information on http: /www. gartner. com/it/page. jsp?id=995812.

Google Scholar

[10] Information on http: /www. gartner. com/it/page. jsp? id=1230413.

Google Scholar

[11] Information on http: /www. slideshare. net/scapecast/accenture-mobility-mwc-2012-bubble- over-barcelona-lars-kamp.

Google Scholar

[12] A. Kholmatov and B. Yanikoglu: Pattern Recognition Letters. Vol. 26(15) (2005), p.2400.

Google Scholar

[13] D. Maio, D. Maltoni, R. Capelli, J.L. Wayman and A.K. Jain: IEEE T PATTERN ANAL. Vol. 24(3) (2002), p.402.

Google Scholar

[14] O. Mazhelis, J. Markuula and J. Veijalainen: Info. Manage. & Comp. Secur. Vol. 13(5) (2005), p.367.

Google Scholar

[15] Information on http: /www. medtrng. com/posturesdirection. htm.

Google Scholar

[16] R. Meier, in: Professional Android™ 2 Application Development (Wiley Publishing Inc., 2010).

Google Scholar

[17] D.M. Monro, S. Rakshit and D. Zhang: IEEE T PATTERN ANAL. Vol. 29(4) (2007), p.586.

Google Scholar

[18] L. O'Gorman: Proceedings of the IEEE, Vol. 91(12) (2003), p. (2021).

Google Scholar

[19] K. Revett, H. Jahankhani, S. Magalhães and H. Santos: Communications in Computer and Information Science (Global E-Security). Vol. 12 (2008), p.210.

Google Scholar

[20] W. Shi, J. Yang, Y. Jiang, F. Yang and Y. Xiong: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), (2011) October 10-12; Shanghai, China.

DOI: 10.1109/wimob.2011.6085412

Google Scholar

[21] Information on http: /www. smartcredit. com/blog/2011/09/02/consumer-reports-survey-on- Mobile-phones-and- security.

Google Scholar

[22] Y. Sun: IEEE T PATTERN ANAL. Vol. 29 (2007), p.1035.

Google Scholar

[23] Information on http: /nakedsecurity. sophos. com/2011/08/09/free-sophos-mobile-security- toolkit.

Google Scholar

[24] Information on http: /www. vistalab. com/commoninjuries. asp.

Google Scholar

[25] X. Wu, K. Wang and D. Zhang: Proceedings of 2006 International Conference on Computational Intelligence and Security, (2006) November 3-6; Guangzhou, China.

Google Scholar

[26] Y.L. Zhang, J. Yang and H.T. Wu: Electronics Letters. Vol. 42(4) (2006), p.204.

Google Scholar