Neuromorphic and Early Warning Behavior-Based Authentication for Mobile Devices

被引:0
|
作者
Phillips, Matthew E. [1 ]
Stepp, Nigel D. [1 ]
Cruz-Albrecht, Jose [1 ]
Sapio, Vincent De [1 ]
Lu, Tsai-Ching [1 ]
Sritapan, Vincent [2 ]
机构
[1] HRL Labs LLC, Malibu, CA 90265 USA
[2] Dept Homeland Secur, Cyber Secur Div, Sci & Technol Directorate, Washington, DC USA
关键词
Neuromorphic chip; Mobile Sensor analysis; user classification; Early Warning System;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Finding the balance between security, privacy, and usability for mobile authentication has been an active area of research for the past several years. Many researchers have taken advantage of the availability of multiple sensors on mobile devices and have used these data to train classifiers to authenticate users. For example, implicit authentication algorithms have been developed based on behavior patterns identified from a combination of sensors including location, co-location, application usage, biometric measurements, continuity of interaction between the user and the phone, and possession of the phone [1,2,3,4,5]. Furthermore, the onboard sensors of mobile devices have previously been used to identify users based on touch [6] and fusions of touch and speech inputs [7]. However, a system utilizing low-power onboard electronics for anomaly detection and user classification is lacking. Here, we report on the performance of two subsystems tested in a controlled use scenario to classify and authenticate users of a mobile device. The overall system utilizes two subsystems for anomaly detection and user classification: (1) a neuromorphic chip for continuous, low-power, online monitoring and classification, and (2) an early warning system (EWS) algorithm for longer duration time-series behavioral and biometric classification.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Neuromorphic and Early Warning Behavior-Based Authentication in Common Theft Scenarios
    Salas, Stephan M.
    Patrick, Richard J.
    Roach, Shane M.
    Stepp, Nigel D.
    Cruz-Albrecht, Jose
    Phillips, Matthew E.
    De Sapio, Vincent
    Lu, Tsai-Ching
    Sritapan, Vincent
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2017,
  • [2] Behavior-based user authentication on mobile devices in various usage contexts
    Dmytro Progonov
    Valentyna Cherniakova
    Pavlo Kolesnichenko
    Andriy Oliynyk
    [J]. EURASIP Journal on Information Security, 2022
  • [3] Behavior-based user authentication on mobile devices in various usage contexts
    Progonov, Dmytro
    Cherniakova, Valentyna
    Kolesnichenko, Pavlo
    Oliynyk, Andriy
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)
  • [4] Energy-efficient W-layer for Behavior-based Implicit Authentication on Mobile Devices
    Yang, Yingyuan
    Sun, Jinyuan
    [J]. IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [5] Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices
    Yang, Yingyuan
    Huang, Xueli
    Guo, Yanhui
    Sun, Jinyuan Stella
    [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 229 - 237
  • [6] Keyboard- Behavior-Based Authentication
    Juola, Patrick
    Noecker, John I., Jr.
    Stolerman, Ariel
    Ryan, Michael V.
    Brennan, Patrick
    Greenstadt, Rachel
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 8 - 11
  • [7] Light-weight behavior-based continuous authentication for personalized mobile robot
    Kobayashi, Taisuke
    Mabuchi, Toshiya
    Kosaka, Mato
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT ROBOTICS AND APPLICATIONS, 2022, 6 (04) : 694 - 706
  • [8] Light-weight behavior-based continuous authentication for personalized mobile robot
    Taisuke Kobayashi
    Toshiya Mabuchi
    Mato Kosaka
    [J]. International Journal of Intelligent Robotics and Applications, 2022, 6 : 694 - 706
  • [9] A Behavior-based Covert Channel Based on GPS Deception for Smart Mobile Devices
    Wu, Bin
    Liu, Hanwen
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] A Behavior-Based Proactive User Authentication Model Utilizing Mobile Application Usage Patterns
    Ashibani, Yosef
    Mahmoud, Qusay H.
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, 11489 : 284 - 295