Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
IEEE Transactions on Information Forensics and Security, 2017ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and
for constantly protecting privacy. Smartphone sensors can measure users' unique
behavioral characteristics when they interact with smartphones, based on different habits,
gestures, and angle preferences of touch actions. This paper investigates the reliability and
applicability of using motion-sensor behavior for active and continuous smartphone …
The increasing use of smartphones as personal computing platforms to access personal information has stressed the demand for secure and usable authentication techniques, and for constantly protecting privacy. Smartphone sensors can measure users' unique behavioral characteristics when they interact with smartphones, based on different habits, gestures, and angle preferences of touch actions. This paper investigates the reliability and applicability of using motion-sensor behavior for active and continuous smartphone authentication across various operational scenarios, and presents a systematic evaluation of the distinctiveness and permanence properties of the behavior. For each sample of sensor behavior, kinematic information sequences are extracted and analyzed, which are characterized by statistic-, frequency-, and wavelet-domain features, to provide accurate and fine-grained characterization of users' touch actions. A Markov-based decision procedure, using one-class learning techniques, is developed and applied to the feature space for performing authentication. Analyses are conducted using the sensor data of 520 200 touch actions from 102 subjects across various operational scenarios. Extensive experiments show that motion-sensor behavior exhibits sufficient discriminability and stability for active and continuous authentication, and can achieve a false-rejection rate of 5.03% and a false-acceptance rate of 3.98%. Additional experiments on usability to operation length, sensitivity to application scenario, scalability to user size, contribution to different sensors, and response to behavior change are provided to further explore the effectiveness and applicability. We also implement an authentication system into the Android system that can react to the presence of the legitimate user.
ieeexplore.ieee.org
Showing the best result for this search. See all results