Smartphone Security Using Swipe Behavior-based Authentication

被引:5
|
作者
Ali, Adnan Bin Amanat [1 ]
Ponnusamy, Vasaki [1 ]
Sangodiah, Anbuselvan [1 ]
Alroobaea, Roobaea [2 ]
Jhanjhi, N. Z. [3 ]
Ghosh, Uttam [4 ]
Masud, Mehedi [2 ]
机构
[1] Univ Tunku Abdul Rahman, Dept Comp & Commun Technol, Kampar 31900, Malaysia
[2] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, At Taif 21944, Saudi Arabia
[3] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya 47500, Malaysia
[4] Vanderbilt Univ, Nashville, TN 37240 USA
来源
关键词
Smartphone security; behavioral biometrics; mobile security; feature set selection; swipe behavior; BIOMETRIC AUTHENTICATION; MOBILE;
D O I
10.32604/iasc.2021.015913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user's authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning classifiers are used, of which random forest is selected based on the best values of accuracy and F-measure. A real-time system is developed by shifting all of the computational power to a cloud server to overcome the smartphone's computational limitations. The system is tested on three smartphones, and it is found that a minimum of seven swipes is sufficient to check user authenticity. In our experiments, the proposed feature set performs better than a state-of-the-art feature set.
引用
收藏
页码:571 / 585
页数:15
相关论文
共 50 条
  • [1] Capacitive Swipe Gesture Based Smartphone User Authentication and Identification
    Rilvan, Mohamed Azard
    Chao, Jedrik
    Hossain, Md Shafaeat
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON COGNITIVE AND COMPUTATIONAL ASPECTS OF SITUATION MANAGEMENT (IEEE COGSIMA), 2020, : 59 - 66
  • [2] Keyboard- Behavior-Based Authentication
    Juola, Patrick
    Noecker, John I., Jr.
    Stolerman, Ariel
    Ryan, Michael V.
    Brennan, Patrick
    Greenstadt, Rachel
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 8 - 11
  • [3] Towards Environment-independent Behavior-based User Authentication Using WiFi
    Shi, Cong
    Liu, Jian
    Borodinov, Nick
    Leao, Bruno
    Chen, Yingying
    [J]. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 666 - 674
  • [4] Implicit Authentication for Smartphone Security
    Lee, Wei-Han
    Lee, Ruby B.
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, ICISSP 2015, 2015, 576 : 160 - 176
  • [5] Behavior-based network security goes mainstream
    Geer, D
    [J]. COMPUTER, 2006, 39 (03) : 14 - 17
  • [6] Behavior-based Authentication using User Biological Data to IoT Device having Touchscreen
    Lee, Jiwoo
    Park, SoHyeon
    Lee, Eun-Kyu
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 750 - 752
  • [7] Neuromorphic and Early Warning Behavior-Based Authentication for Mobile Devices
    Phillips, Matthew E.
    Stepp, Nigel D.
    Cruz-Albrecht, Jose
    Sapio, Vincent De
    Lu, Tsai-Ching
    Sritapan, Vincent
    [J]. 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [8] BubbleMap: Privilege Mapping for Behavior-Based Implicit Authentication Systems
    Yang, Yingyuan
    Huang, Xueli
    Li, Jiangnan
    Sun, Jinyuan Stella
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (08) : 4548 - 4562
  • [9] Biometric authentication based on touchscreen swipe patterns
    Antal, Margit
    Szabo, Laszlo Zsolt
    [J]. 9TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2015, 2016, 22 : 862 - 869
  • [10] Realtime Behavior-Based Continual Authentication of Users in Virtual Reality Environments
    Miller, Robert
    Ajit, Ashwin
    Banerjee, Natasha Kholgade
    Banerjee, Sean
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND VIRTUAL REALITY (AIVR), 2019, : 253 - 254