Continuous Authentication Leveraging Matrix Profile

被引:0
|
作者
Ibanez-Lissen, Luis [1 ]
de Fuentes, Jose Maria [1 ,2 ]
Gonzalez-Manzano, Lorena [1 ,3 ]
Anciaux, Nicolas [4 ]
机构
[1] Univ Carlos III Madrid, Madrid, Spain
[2] Inria, Palaiseau, France
[3] Inst Politech Paris, Palaiseau, France
[4] U ParisSaclay, Inria, UVSQ, Palaiseau, France
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
Continuous authentication; privacy; data minimization; storage limitation; matrix profile; deep learning;
D O I
10.1145/3664476.3664481
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous Authentication (CA) mechanisms involve managing sensitive data from users which may change over time. Both requirements (privacy and adapting to new users) lead to a tension in the amount and granularity of the data at stake. However, no previous work has addressed them together. This paper proposes a CA approach that leverages incremental Matrix Profile (MP) and Deep Learning using accelerometer data. Results show that MP is effective for CA purposes, leading to 99% of accuracy when a single user is authorized. Besides, the model can on-the-fly increase the set of authorized users up to 10 while offering similar accuracy rates. The amount of input data is also characterized - the last 15 s. of data in the user device require 0.4 MB of storage and lead to a CA accuracy of 97% even with 10 authorized users.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Augmented Cognition for Continuous Authentication
    Mogire, Nancy
    Ogawa, Michael-Brian
    Auernheimer, Brent
    Crosby, Martha E.
    AUGMENTED COGNITION: NEUROCOGNITION AND MACHINE LEARNING, AC 2017, PT I, 2017, 10284 : 342 - 356
  • [22] Continuous authentication with a focus on explainability
    Rocha, Rodrigo
    Carneiro, Davide
    Novais, Paulo
    NEUROCOMPUTING, 2021, 423 : 697 - 702
  • [23] Continuous Authentication for Voice Assistants
    Feng, Huan
    Fawaz, Kassem
    Shin, Kang G.
    PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, : 343 - 355
  • [24] Continuous Authentication by Electrocardiogram Data
    Guennoun, Mouhcine
    Abbad, Najoua
    Talom, Jonas
    Rahman, Sk Md Mizanur
    El-Khatib, Khalil
    IEEE TIC-STH 09: 2009 IEEE TORONTO INTERNATIONAL CONFERENCE: SCIENCE AND TECHNOLOGY FOR HUMANITY, 2009, : 40 - 42
  • [25] Behavioral Biometrics for Continuous Authentication
    Handa, Jigyasa
    Singh, Arjeeta
    Goyal, Aditya
    Aggarwal, Parth
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 284 - 289
  • [26] Authentication from Matrix Conjugation
    Grigoriev, Dima
    Shpilrain, Vladimir
    GROUPS COMPLEXITY CRYPTOLOGY, 2009, 1 (02) : 199 - 205
  • [27] PIN Number-based Authentication Leveraging Physical Vibration
    Liu, Jian
    Wang, Chen
    Chen, Yingying
    MOBICOM'16: PROCEEDINGS OF THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2016, : 426 - 427
  • [28] Leveraging Battery Usage from Mobile Devices for Active Authentication
    Spooren, Jan
    Preuveneers, Davy
    Joosen, Wouter
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [29] Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations
    Deng, Daniel Y.
    Chan, Andrew H.
    Suh, G. Edward
    DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 682 - 687
  • [30] Leveraging autobiographical memory for two-factor online authentication
    Al-Ameen, Mahdi Nasrullah
    Haque, S. M. Taiabul
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 386 - 399