LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES

被引:0
|
作者
Kolosnjaji, Bojan [1 ]
Huefner, Antonia [1 ]
Eckert, Claudia [1 ]
Zarras, Apostolis [2 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Maastricht Univ, Maastricht, Netherlands
关键词
Machine Learning; User Authentication; Security;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Since the amount of sensitive information stored on smartphones expands with the growth of their popularity, the need for reliable and usable authentication on these devices increases. Constant reauthentication requests of standard methods, such as PINs, passwords, and swipe patterns, annoy many users who prefer to sacrifice the security of their mobile devices for the quest for maximum usability. An alternative to this approach is sensor-based authentication, where we fingerprint the user interaction by processing signals from sensors such as touchscreen or accelerometer. In this paper, we construct a budgeted online version of One-Class Support Vector Machine (OC-SVM) to maintain authentication performance while limiting the model size and evaluate the performance compared to an unconstrained model. The results of our experiments reveal that it is possible to correctly detect invalid smartphone users in a constrained environment using our budgeted learning methodology.
引用
收藏
页码:2042 / 2046
页数:5
相关论文
共 50 条
  • [21] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [22] Breaking Three Remote user Authentication Systems for Mobile Devices
    Li, Wenting
    Shen, Yaosheng
    Wang, Ping
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2018, 90 (8-9): : 1179 - 1190
  • [23] Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Devices
    Oishi, Shintaro
    Ichino, Masatsugu
    Yoshiura, Hiroshi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 428 - 429
  • [24] Breaking Three Remote user Authentication Systems for Mobile Devices
    Wenting Li
    Yaosheng Shen
    Ping Wang
    [J]. Journal of Signal Processing Systems, 2018, 90 : 1179 - 1190
  • [25] User Authentication Method using Shaking Actions in Mobile Devices
    Lee, Tae Kyong
    Kim, Tae Guen
    Im, Eul Gyu
    [J]. 2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 142 - 147
  • [26] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    [J]. INFORMATION FUSION, 2021, 66 : 76 - 99
  • [27] User Authentication Interfaces in Mobile Devices: Some Design Considerations
    Liang, Hai-Ning
    Fleming, Charles
    Wang, Wei
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 754 - 757
  • [28] User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) : 107 - 118
  • [29] Strengthen user authentication on mobile devices by using user's touch dynamics pattern
    Teh, Pin Shen
    Zhang, Ning
    Tan, Syh-Yuan
    Shi, Qi
    Khoh, Wee How
    Nawaz, Raheel
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (10) : 4019 - 4039
  • [30] Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
    Pin Shen Teh
    Ning Zhang
    Syh-Yuan Tan
    Qi Shi
    Wee How Khoh
    Raheel Nawaz
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4019 - 4039