Movement Pattern Based Authentication for Smart Mobile Devices

被引:2
|
作者
Rahman, Khandaker Abir [1 ]
Tubbs, Dustyn J. [2 ]
Hossain, Md Shafaeat [3 ]
机构
[1] Saginaw Valley State Univ, Dept Comp Sci & Informat Syst, University Ctr, MI 48710 USA
[2] Microsoft Corp, Redmond, WA 98052 USA
[3] Southern Connecticut State Univ, Dept Comp Sci, New Haven, CT USA
关键词
movement pattern; authentication; screen unlock; mobile device;
D O I
10.1109/ICMLA.2018.00172
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We outline a novel method of user authentication for smart mobile devices, such as smartphones or tablets and propose movement pattern based authentication as an alternate to current methods that relies on a pin or drawn-pattern. While the current methods are vulnerable against common attacks (e.g., smudge attacks, shoulder surfing), our method, in contrast, is more resilient against the attacks of these kinds because it utilizes sensory data given off by the device during a preset movement for authentication. In our experiment, we recorded the values given off by four physical observational sensors: (1) accelerometer, (2) linear accelerometer, (3) gyroscope and (4) tilt sensor, which each had three axes, over a set of movements. We experimented with 10 arbitrary movement-patterns and gathered 12 samples of each (net 120 samples) to test with. We developed our own method of authentication, through which we performed 35,650 authentication attempts and found a 20.36% Equal Error Rate.
引用
收藏
页码:1054 / 1058
页数:5
相关论文
共 50 条
  • [1] Rethinking Authentication on Smart Mobile Devices
    Wang, Ding
    Shen, Jian
    Liu, Joseph K.
    Choo, Kim-Kwang Raymond
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [2] Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices
    Rauen, Zachary I.
    Anjomshoa, Fazel
    Kantarci, Burak
    [J]. PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18), 2018, : 51 - 58
  • [3] An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices
    Huang, Qinglong
    Huang, Haiping
    Wang, Wenming
    Li, Qi
    Wu, Yuhan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [4] Secure Pattern-based Authentication Against Shoulder Surfing Attack in Smart Devices
    Shin, Hyungjun
    Kim, Daeyoung
    Hur, Junbeom
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 13 - 18
  • [5] Comparison of PIN- and Pattern-based Behavioral Biometric Authentication on Mobile Devices
    Li, Yanyan
    Yang, Junshuang
    Xie, Mengjun
    Carlson, Dylan
    Jang, Han Gil
    Bian, Jiang
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1317 - 1322
  • [6] Proximity-based authentication for mobile devices
    Jansen, W
    Gavrila, S
    Korolev, V
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 398 - 404
  • [7] Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks
    Wang, Chen
    Zheng, Wenying
    Ji, Sai
    Liu, Qi
    Wang, Anxi
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [8] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191
  • [9] Rhythm-Based Authentication Scheme on Smart Devices
    Lee, Jae Dong
    Kang, Won Min
    Moon, Chang Hyun
    Jeong, Hwa-Young
    Jeong, Young-Sik
    Jung, Jai-Jin
    Park, Jong Hyuk
    [J]. FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 313 - 319
  • [10] Swipe Gesture based Continuous Authentication for Mobile Devices
    Mondal, Soumik
    Bours, Patrick
    [J]. 2015 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2015, : 458 - 465