Continuous User Authentication on Multiple Smart Devices

被引:3
|
作者
Wang, Yajie [1 ]
Zhang, Xiaomei [1 ]
Hu, Haomin [1 ]
机构
[1] Shanghai Univ Engn Sci, Sch Elect & Elect Engn, Shanghai 201620, Peoples R China
基金
中国国家自然科学基金;
关键词
multiple smart devices; privacy and security; continuous authentication; spatiotemporal convolutional neural network; confidence-based strategy; GAIT RECOGNITION; SENSOR;
D O I
10.3390/info14050274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been conducted to apply user authentication through behavioral biometrics. However, few of them consider continuous user authentication on multiple smart devices. In this paper, we investigate user authentication from a new perspective-continuous authentication on multi-devices, that is, continuously authenticating users after both initial access to one device and transfer to other devices. In contrast to previous studies, we propose a continuous user authentication method that exploits behavioral biometric identification on multiple smart devices. In this study, we consider the sensor data captured by accelerometer and gyroscope sensors on both smartphones and tablets. Furthermore, multi-device behavioral biometric data are utilized as the input of our optimized neural network model, which combines a convolutional neural network (CNN) and a long short-term memory (LSTM) network. In particular, we construct two-dimensional domain images to characterize the underlying features of sensor signals between different devices and then input them into our network for classification. In order to strengthen the effectiveness and efficiency of authentication on multiple devices, we introduce an adaptive confidence-based strategy by taking historical user authentication results into account. This paper evaluates the performance of our multi-device continuous user authentication mechanism under different scenarios, and extensive empirical results demonstrate its feasibility and efficiency. Using the mechanism, we achieved mean accuracies of 99.8% and 99.2% for smartphones and tablets, respectively, in approximately 2.3 s, which shows that it authenticates users accurately and quickly.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] Leveraging Breathing for Continuous User Authentication
    Liu, Jian
    Dong, Yudi
    Chen, Yingying
    Wang, Yan
    Zhao, Tianming
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 786 - 788
  • [32] Known User Continuous Authentication System
    Brosso, Ines
    Ferreira, Fernando
    Bressan, Graca
    Ruggiero, Wilson V.
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 747 - +
  • [33] A Continuous Articulatory-Gesture-Based Liveness Detection for Voice Authentication on Smart Devices
    Zhang, Linghan
    Tan, Sheng
    Chen, Yingying
    Yang, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (23) : 23320 - 23331
  • [34] FingerSlid: Towards Finger-Sliding Continuous Authentication on Smart Devices Via Vibration
    Xie, Yadong
    Li, Fan
    Wang, Yu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 6045 - 6059
  • [35] Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case
    Chauhan, Jagmohan
    Asghar, Hassan Jameel
    Mahanti, Anirban
    Kaafar, Mohamed Ali
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 648 - 665
  • [36] Microprocessor smart cards with fingerprint user authentication
    Sanchez-Reillo, R
    Mengibar-Pozo, L
    Sanchez-Avila, C
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (03) : 22 - 24
  • [37] Microprocessor smart cards with fingerprint user authentication
    Sanchez-Reillo, R
    Sanchez-Avila, C
    Mengibar-Pozo, L
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 46 - 49
  • [38] User Authentication Schemes Based on Smart Cards
    Li Zhongxian
    Zhan Banghua and Yang Yixian (Beijing University of Posts and Telecommunications
    The Journal of China Universities of Posts and Telecommunications, 1998, (02) : 57 - 59
  • [39] APPLICABILITY OF SMART CARDS TO NETWORK USER AUTHENTICATION
    KRAJEWSKI, M
    CHIPCHAK, JC
    CHODOROW, DA
    TROSTLE, JT
    COMPUTING SYSTEMS, 1994, 7 (01): : 75 - 89
  • [40] CapMat: A Smart Foot Mat for User Authentication
    Matthies, Denys J. C.
    Elvitigala, Don Samitha
    Muthukumarana, Sachith
    Huber, Jochen
    Nanayakkara, Suranga
    PROCEEDINGS OF THE 10TH AUGMENTED HUMAN INTERNATIONAL CONFERENCE 2019 (AH2019), 2019,