Multi-source interactive behavior analysis for continuous user authentication on smartphones

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Analyzing smartphone users’ behavioral characteristics for recognizing the identities has received growing interest from security and biometric researchers. Extant smartphone authentication methods usually provide one-time identity verification in some specific applications, but the authenticated user is still subject to masquerader attacks or session hijacking. This paper presents a novel smartphone authentication approach by analyzing multi-source user-machine usage behavior (i.e., power consumption, physical sensors, and touchscreen interactions), which can continuously verify the presence of a smartphone user. Extensive experiments are conducted to show that our authentication approach can be up to a relatively high accuracy with an equal-error rate of 5.5%. This approach can also be seamlessly integrated with existing authentication methods, which does not need additional hardware and is transparent to users.

Original languageEnglish
Title of host publicationBiometric Recognition - 13th Chinese Conference, CCBR 2018, Proceedings
EditorsZhenan Sun, Shiguang Shan, Zhenhong Jia, Kurban Ubul, Jie Zhou, Jianjiang Feng, Zhenhua Guo, Yunhong Wang
PublisherSpringer Verlag
Pages669-677
Number of pages9
ISBN (Print)9783319979083
DOIs
StatePublished - 2018
Event13th Chinese Conference on Biometric Recognition, CCBR 2018 - Urumchi, China
Duration: 11 Aug 201812 Aug 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10996 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th Chinese Conference on Biometric Recognition, CCBR 2018
Country/TerritoryChina
CityUrumchi
Period11/08/1812/08/18

Keywords

  • Continuous authentication
  • Motion sensor
  • Smartphone security

Fingerprint

Dive into the research topics of 'Multi-source interactive behavior analysis for continuous user authentication on smartphones'. Together they form a unique fingerprint.

Cite this