Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

被引:2
|
作者
Jose, Christy James [1 ]
Rajasree, M. S. [2 ]
机构
[1] Govt Engn Coll, Idukki 685603, India
[2] APJ Abdul Kalam Technol Univ, Thiruvananthapuram 695016, Kerala, India
来源
关键词
Deep reinforcement learning; gaussian weighted; non-local; mean filter; cauchy kriging regression; continuous czekanowski's; implicit continuous authentication; mobile devices; SECURITY; SENSOR;
D O I
10.32604/csse.2023.025672
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users' identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Krigingbased Continuous Czekanowski's (GWCK-CC). First, a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise present in the raw input face images. Cauchy Kriging Regression function is employed to reduce the dimensionality. Finally, Continuous Czekanowski's Classification is utilized for proficient classification between the genuine user and attacker. By this way, the proposed GWCK-CC method achieves accurate authentication with minimum error rate and time. Experimental assessment of the proposed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset. The results confirm that the proposed GWCK-CC method enhances authentication accuracy, by 9%, reduces the authentication time, and error rate by 44%, and 43% as compared to the existing methods.
引用
收藏
页码:1357 / 1372
页数:16
相关论文
共 50 条
  • [31] Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication
    Siddiqui, Nyle
    Dave, Rushit
    Vanamala, Mounika
    Seliya, Naeem
    [J]. MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2022, 4 (02): : 502 - 518
  • [32] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [33] Continuous Control with Deep Reinforcement Learning for Mobile Robot Navigation
    Xiang, Jiaqi
    Li, Qingdong
    Dong, Xiwang
    Ren, Zhang
    [J]. 2019 CHINESE AUTOMATION CONGRESS (CAC2019), 2019, : 1501 - 1506
  • [34] Deep Learning-Enhanced Physical Layer Authentication for Mobile Devices
    Guo, Yijia
    Zhang, Junqing
    Hong, Y. -W. Peter
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 826 - 831
  • [35] Continuous User Authentication on Multiple Smart Devices
    Wang, Yajie
    Zhang, Xiaomei
    Hu, Haomin
    [J]. INFORMATION, 2023, 14 (05)
  • [36] Novelty Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Rodriguez, Jonathan
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 837 - 842
  • [37] Outlier Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2778 - 2783
  • [38] Face-Based Multiple User Active Authentication on Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1240 - 1250
  • [39] Implicit Authentication for Mobile Devices Using Typing Behavior
    Gurary, Jonathan
    Zhu, Ye
    Alnahash, Nahed
    Fu, Huirong
    [J]. HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 25 - 36
  • [40] User Allocation in Mobile Edge Computing: A Deep Reinforcement Learning Approach
    Panda, Subrat Prasad
    Banerjee, Ansuman
    Bhattacharya, Arani
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 447 - 458