Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors
Abstract
:1. Introduction
- We explore the use of data stream mining techniques over smartphone sensor data to achieve user-in-a-context authentication.
- We study the extent to which four non-assisted sensorial data streams (battery, transmitted data, ambient noise and light) can serve as identifiers, either alone or in combination.
- We determine how long it takes to detect robbery leveraging the aforementioned data streams under different usability, immediacy and readiness constraints.
2. Background
2.1. Data Stream Mining
- Process an example at a time and just once: Data should be processed as it arrives. When an instance is discarded, there is not any possibility to retrieve it again. This limitation can be relaxed only in cases where it is practical to re-analyse an entire data stream. Since smartphone sensors produce endless data streams and count on constrained storage, for the purpose of this work, this requirement is critical.
- Use of a limited amount of memory: DSM techniques should be able to process much more data than memory available. Memory is commonly used to store running statistics and to store the current model.As in the previous case and given the limitations mobile devices have, this requirement is essential in the proposed context.
- Work in a limited amount of time: An algorithm must scale according to the number of instances, thus complexity should be linear in the number of samples. DSM algorithms should process data at real time, ensuring that data is processed according to the stream speed. Time is more or less critical depending on the application. Nonetheless, algorithms should be as fast as possible to give results in a sensible amount of time.In the considered case, the process should be carried out with the minimum possible delay to timely detect robbery.
- Predict at any point: the best algorithm should do the best prediction regardless of the amount of analysed samples. Generating a model should be as efficient as possible, avoiding recomputations in the final stage. Due to this issue, there is not a training phase if it is defined as the period needed to set up the system before entering in production.
- Naive Bayes (NB). This technique naturally keeps a moderate memory usage over time. It consists of assigning the most probable class for an instance X based on the classes assigned to previous instances, using Bayes theorem. Let assume the set {X, C}, where X = {, , …, } are the n most recent instances and C = {, , …, } are classes of related users. It must be noted that, in the adaptation to DSM, this technique only keeps a subset of all already seen instances in memory. Given a new instance , the use of NB involves computing [15]:The predicted class is the one that maximizes .
- K-Nearest Neighbor (KNN). It is a lazy algorithm, meaning that all the effort is performed once predictions are required. It looks for already known instances that are more similar to the instance to classify. In particular, the used algorithm classifies an instance based on its k nearest neighbors according to a distance metrics. In our case, the distance is computed using the Euclidean distance. For bi-dimensional points, this is computed as follows:Any instance is classified considering the predominant label of the k nearest ones. It must be noted that, in the DSM version, these points are a subset of all instances seen at the moment in which the prediction is done.
- Hoeffding Adaptive Trees (HAT). In order to understand HAT, the concept of Hoeffding Window Tree (HWT) is required. A HWT is a decision tree based on a sliding window keeping the last instances on the stream. This type of trees use the Hoeffding bound [16], which states that, with probability 1-, the true mean of a random variable of range R will not differ from the estimated mean after n independent observations by more than:Based on this concept, a HAT is a HWT that learns from data streams without a fixed size of the sliding window. In this paper, we focus on the ADWIN variant, which automatically and continuously detects the rate of change in data streams rather than using a priori guesses [17].
2.2. Sensorial Data in Smartphones
3. Model
3.1. Entities: Adversarial Model
3.2. Goals
- Accuracy. The smartphone should be able to differentiate between and (user identifiability), between and (environment identifiability) and between in and in (user-in-a-context identifiability).
- Immediacy. The smartphone should be able to detect the presence of in or the robbery from to in a period of time that should be as short as possible.
- Usability. The smartphone should only get blocked when comes into play. The device should remain in safe mode (i.e., unblocked) while the user is porting it in . In addition, the device should store a small set of data to keep on working, thus relieving the storage capacity.
- Readiness. The mechanism should be able to start working in the smartphone after a learning period that should be as small as possible.
3.3. Working Assumptions
4. Approach
4.1. Approach Description
4.2. Sensorial Information
5. Experimental Analysis
5.1. Accuracy Analysis
5.1.1. Data Preparation
5.1.2. Analysis Results
5.2. Immediacy, Usability and Readiness Assessment
5.2.1. Experimental Preparation: Data and Parameters
5.2.2. Immediacy Assessment
5.2.3. Usability Assessment
5.2.4. Readiness Assessment
5.3. Discussion: Towards the Best Settings for a Security—Usability Balance
6. Related Work
7. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Smartphone Usage Global stats. Available online: https://www.emarketer.com/Article/Mobile-Phone-Smartphone-Usage-Varies-Globally/1014738 (accessed on 1 April 2018).
- De Luca, A.; Lindqvist, J. Is secure and usable smartphone authentication asking too much? Computer 2015, 48, 64–68. [Google Scholar] [CrossRef]
- Buschek, D.; Hartmann, F.; von Zezschwitz, E.; De Luca, A.; Alt, F. SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, 7–12 May 2016; ACM: New York, NY, USA, 2016; pp. 3736–3747. [Google Scholar]
- Furnell, S.; Clarke, N.; Karatzouni, S. Beyond the pin: Enhancing user authentication for mobile devices. Comput. Fraud Secur. 2008, 12–17. [Google Scholar] [CrossRef]
- Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8, 136–148. [Google Scholar] [CrossRef]
- Riva, O.; Qin, C.; Strauss, K.; Lymberopoulos, D. Progressive Authentication: Deciding When to Authenticate on Mobile Phones. In Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, 8–10 August 2012; pp. 301–316. [Google Scholar]
- Basu, A.; Xu, R.; Rahman, M.S.; Kiyomto, S. User-in-a-context: A blueprint for context-aware identification. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 329–334. [Google Scholar]
- Lee, W.h.; Lee, R.B. Multi-sensor Authentication to Improve Smartphone Security. In Proceedings of the Conference on Information Systems Security and Privacy, Loire vally, France, 9–11 February 2015; pp. 1–11. [Google Scholar]
- Kayacık, H.; Just, M.; Baillie, L.; Aspinall, D.; Micallef, N. Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. In Proceedings of the Third Workshop on Mobile Security Technologies (MoST), San Jose, CA, USA, 17 May 2014. [Google Scholar]
- Mahbub, U.; Sarkar, S.; Patel, V.M.; Chellappa, R. Active user authentication for smartphones: A challenge data set and benchmark results. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA, 6–9 September 2016; pp. 1–8. [Google Scholar]
- Shi, W.; Yang, J.; Jiang, Y.; Yang, F.; Xiong, Y. SenGuard: Passive user identification on smartphones using multiple sensors. In Proceedings of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, Wuhan, China, 10–12 October 2011; pp. 141–148. [Google Scholar]
- Jiang, S.; Zhou, P.; Li, M. Detecting Phantom Data Usage on Smartphones with Analysis of Contextual Information. Int. J. Distrib. Sens. Netw. 2015, 11, 135150. [Google Scholar] [CrossRef]
- Bifet, A.; Kirkby, R. Data Stream Mining A Practical Approach. 2007. Available online: https://www.cs.waikato.ac.nz/~abifet/MOA/StreamMining.pdf (accessed on 16 April 2018).
- Gaber, M.M.; Zaslavsky, A.; Krishnaswamy, S. Data stream mining. In Data Mining and Knowledge Discovery Handbook; Springer: Berlin, Germany, 2009; pp. 759–787. [Google Scholar]
- Friedman, N.; Geiger, D.; Goldszmidt, M. Bayesian network classifiers. Mach. Learn. 1997, 29, 131–163. [Google Scholar] [CrossRef]
- Matuszyk, P.; Krempl, G.; Spiliopoulou, M. Correcting the usage of the hoeffding inequality in stream mining. In International Symposium on Intelligent Data Analysis; Springer: Berlin/Heidelberg, Germany, 2013; pp. 298–309. [Google Scholar]
- Bifet, A.; Gavalda, R. Learning from time-changing data with adaptive windowing. In Proceedings of the 2007 SIAM International Conference on Data Mining, Minneapolis, MN, USA, 26–28 April 2007. [Google Scholar]
- Android Developer—Sensors Overview. Available online: https://developer.android.com/guide/topics/sensors/sensors_overview.html (accessed on 1 April 2018).
- Wagner, D.; Soto, P. Mimicry attacks on host-based intrusion detection systems. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 255–264. [Google Scholar]
- Tellez, A.; Pumperla, M.; Malohlava, M. Mastering Machine Learning with Spark 2.x; Packt Publishing: Birmingham, UK, 2017. [Google Scholar]
- Taylor, V.F.; Spolaor, R.; Conti, M.; Martinovic, I. Robust smartphone app identification via encrypted network traffic analysis. IEEE Trans. Inf. Forensics Secur. 2017. [Google Scholar] [CrossRef]
- Mirsky, Y.; Shabtai, A.; Rokach, L.; Shapira, B.; Elovici, Y. Sherlock vs moriarty: A smartphone dataset for cybersecurity research. In Proceedings of the 2016 ACM workshop on Artificial intelligence and security, Vienna, Austria, 28 October 2016; pp. 1–12. [Google Scholar]
- Elson, J.M.; Bennett, J.M. Calculation of the power spectral density from surface profile data. Appl. Opt. 1995, 34, 201–208. [Google Scholar] [CrossRef] [PubMed]
- Logan, B. Mel Frequency Cepstral Coefficients for Music Modeling. ISMIR 2000, 270, 1–11. [Google Scholar]
- Bifet, A.; Holmes, G.; Kirkby, R.; Pfahringer, B. Moa: Massive online analysis. J. Mach. Learn. Res. 2010, 11, 1601–1604. [Google Scholar]
- Smartphone CA Github Repository. Available online: https://github.com/jmdefuentes/smartphoneCA (accessed on 1 April 2018).
- Tukey, J. Exploratory Data Analysis; Addison-Wesley: Boston, MA, USA, 1977. [Google Scholar]
- Box Plot—MatLab Boxplots. Available online: https://mathworks.com/help/stats/boxplot.html (accessed on 1 April 2018).
- Google The iPhone 6S Camera Is a Huge Storage Hog (but It Might Be Worth It. Available online: https://www.cnet.com/news/iphone-6s-camera-filesizes-4k-live-photos-hdr/ (accessed on 1 April 2018).
- Mosenia, A.; Sur-Kolay, S.; Raghunathan, A.; Jha, N.K. CABA: Continuous authentication based on BioAura. IEEE Trans. Comput. 2017, 66, 759–772. [Google Scholar] [CrossRef]
- Shi, E.; Niu, Y.; Jakobsson, M.; Chow, R. Implicit authentication through learning user behavior. In Proceedings of the International Conference on Information Security, Boca Raton, FL, USA, 25–28 September 2010; pp. 99–113. [Google Scholar]
- Fridman, L.; Weber, S.; Greenstadt, R.; Kam, M. Active Authentication on Mobile Devices via Stylometry, GPS Location, Web Browsing Behavior, and Application Usage Patterns. IEEE Syst. J. 2017, 11, 513–521. [Google Scholar]
- Li, F.; Clarke, N.; Papadaki, M.; Dowland, P. Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Secur. 2014, 13, 229–244. [Google Scholar] [CrossRef]
- Witte, H.; Rathgeb, C.; Busch, C. Context-Aware Mobile Biometric Authentication based on Support Vector Machines. In Proceedings of the 2013 Fourth International Conference on Emerging Security Technologies (EST), Cambridge, UK, 9–11 September 2013; pp. 29–32. [Google Scholar]
- Lee, W.H.; Lee, R.B. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017. [Google Scholar]
- Zhu, J.; Wu, P.; Wang, X.; Zhang, J. SenSec: Mobile security through passive sensing. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 1128–1133. [Google Scholar]
- Google Support—Smart lock. Available online: https://support.google.com/accounts/answer/6160273?hl=en (accessed on 1 April 2018).
- Google Support—Trusted Places. Available online: https://support.google.com/nexus/answer/6093922?hl=en&ref_topic=6168852 (accessed on 1 April 2018).
- Wu, P.; Zhu, J.; Zhang, J.Y. MobiSens: A versatile mobile sensing platform for real-world applications. Mob. Netw. Appl. 2013, 18, 60–80. [Google Scholar] [CrossRef]
- Jordan Frank, S.M.D.P.; Frank, J.; Mannor, S.; Precup, D. Activity and Gait Recognition with Time-Delay Embeddings. In Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA, USA, 11–15 July 2010; pp. 407–408. [Google Scholar]
- Buthpitiya, S.; Zhang, Y.; Dey, A.K.; Griss, M. N-gram geo-trace modeling. In Pervasive Computing, Proceedings of the International Conference on Pervasive Computing, San Francisco, CA, USA, 12–15 June 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 97–114. [Google Scholar]
- Trojahn, M.; Ortmeier, F. Toward mobile authentication with keystroke dynamics on mobile phones and tablets. In Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25–28 March 2013; pp. 697–702. [Google Scholar]
- Li, L.; Zhao, X.; Xue, G. Unobservable Re-Authentication for Smartphones; Internet Society: Reston, VA, USA, 2011. [Google Scholar]
- Nickel, C.; Wirtl, T.; Busch, C. Authentication of smartphone users based on the way they walk using k-NN algorithm. In Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Piraeus, Greece, 18–20 July 2012; pp. 16–20. [Google Scholar]
- Yu, Z.; Huang, L.; Guo, H.; Xu, H. i-Shield: A System to Protect the Security of Your Smartphone. In Proceedings of the International Conference on Knowledge Science, Engineering and Management, Passau, Germany, 5–7 October 2016; pp. 453–464. [Google Scholar]
- Feng, T.; Zhao, X.; Desalvo, N.; Gao, Z.; Wang, X.; Shi, W. Security after login: Identity change detection on smartphones using sensor fusion. In Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 14–16 April 2015; pp. 1–6. [Google Scholar]
- Khan, H.; Atwater, A.; Hengartner, U. Itus : An Implicit Authentication Framework for Android. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, Maui, HI, USA, 7–11 September 2014; pp. 507–518. [Google Scholar]
- Meng, W.; Wong, D.S.; Furnell, S.; Zhou, J. Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutor. 2015, 17, 1268–1293. [Google Scholar] [CrossRef]
- Jain, A.; Kanhangad, V. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recognit. Lett. 2015, 68, 351–360. [Google Scholar] [CrossRef]
- Gong, N.Z.; Payer, M.; Moazzezi, R.; Frank, M. Forgery-Resistant Touch-based Authentication on Mobile Devices. arXiv, 2015; arXiv:1506.02294. [Google Scholar]
- Crouse, D.; Han, H.; Chandra, D.; Barbello, B.; Jain, A.K. Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data. In Proceedings of the 2015 International Conference on Biometrics (ICB), Phuket, Thailand, 19–22 May 2015; pp. 135–142. [Google Scholar]
- Khan, A.M.; Tufail, A.; Khattak, A.M.; Laine, T.H. Activity recognition on smartphones via sensor-fusion and KDA-based SVMs. Int. J. Distrib. Sens. Netw. 2014. [Google Scholar] [CrossRef]
- Shrestha, B.; Ma, D.; Zhu, Y.; Li, H.; Saxena, N. Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2270–2283. [Google Scholar] [CrossRef]
- Mirsky, Y.; Shabtai, A.; Shapira, B.; Elovici, Y.; Rokach, L. Anomaly detection for smartphone data streams. Pervasive Mob. Comput. 2017, 35, 83–107. [Google Scholar] [CrossRef]
- Spooren, J.; Preuveneers, D.; Joosen, W. Leveraging Battery Usage from Mobile Devices for Active Authentication. Mob. Inf. Syst. 2017, 2017, 1367064. [Google Scholar] [CrossRef]
- Lee, W.H.; Liu, X.; Shen, Y.; Jin, H.; Lee, R.B. Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, Indianapolis, IN, USA, 21–23 June 2017; pp. 67–78. [Google Scholar]
Symbol | Meaning |
---|---|
Legitimate user of the device | |
Attacker | |
User physical environment | |
Attacker physical environment | |
Time needed by to attack | |
Time to detect robbery | |
A | Ambient noise sensor |
L | Ambient light sensor |
B | Battery consumption sensor |
TD | Transmitted data sensor |
Sensitivity threshold |
Data Item | Sampling Freq. | Population Size | Time Frame | Total Records |
---|---|---|---|---|
Ambient audio | 10 s | 50 users | 24 months | 98,850,425 |
Ambient light | 10 s | 76,072,797 | ||
Battery | 5 s | 203,472,430 | ||
Transmitted data rates | 5 s | 203,260,663 |
Sensorial Source | Data Items |
---|---|
Audio | DiffSecs, PSD (4), MFCCS (12), Mathematical norms (3) |
Light | Accuracy, Lux |
Battery | Charge type, health, level, online, plugged, scale, status, temperature, voltage |
Transmitted data | Mobile Tx/Rx packets (2), Mobile Tx/Rx bytes (2), WiFi Tx/Rx packets (2), Wifi Tx/Rx bytes (2), Total Tx/Rx packets (2), Total Tx/Rx bytes (2) |
Source | KNN | Adaptive Hoeffding Tree | Naive Bayes | |
---|---|---|---|---|
Environment | Audio (A) | 63.70% | 39.46% | 7.58% |
Light (L) | 43.31% | 44.32% | 8.61% | |
A + L | 68.29% | 42.83% | 7.58% | |
User | Battery (B) | 97.05% | 37.04% | 4.78% |
Transmitted data (TD) | 18.51% | 10.33% | 1.06% | |
User + Environment | A + L + B | 81.35% | 43.02% | 12.02% |
A + L + TD | 65.80% | 24.64% | 8.31% |
Sensor | B | Bytes | L | Bytes | A | Bytes |
---|---|---|---|---|---|---|
Charge type | 1 | accuracy | 1 | DiffSecs | 18 | |
Health | 1 | lux | 4 | PSD | 47 | |
Level | 3 | Separators | 1 | MFCCS | 72 | |
Online | 1 | Math. Norms | 224 | |||
Plugged | 1 | Separators | 19 | |||
Scale | 3 | |||||
Status | 1 | |||||
Temperature | 3 | |||||
Voltage | 4 | |||||
Separators | 8 | |||||
Total bytes | 26 | 6 | 380 |
Purpose | Sensors | Dataset size | Results | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Paper | Context CA | User CA | User- In -Context CA | App Usage Sensors (CPU, Priority, Use of Memory, Transmitted Data) | System-Related Sensors (CPU Usage, Memory Usage, Network Usage, Battery Usage) | Location- and Movement Sensors (Accelerometer, Rotation, GPS, Barometer, Cell ID) | Data-Related Sensors (WiFi, Bluetooth, Phone Calls, SMSs, Global Rx/Tx data) | IO Sensors (Audio, Light, Camera, Screen Info, Temperature) | Other Features | Amount of Users | Time Frame (Days) | Accuracy | Immediacy | Usability | Readiness (Training Conf. (%)) |
[22] | × | App CPU, memory, transmitted data | Battery, CPU, memory | WiFi, global Rx/Tx data | 50 | 547.5 | 10 FRR | 0.25 min/6.6 min | N/A | 1 | |||||
[36] | × | Accelerometer, gyroscope and magnetometer | 20 | 71.3% | N/A | 13.1% false alarms, period unknown | 1 (80%) | ||||||||
[39] | (activity recogn.) | Battery | Accelerometer, magnetometer, GPS, rotation matrix | WiFi, global Rx/Tx data, bluetooth | Ambient light, audio, temperature, camera, microphone | Process list | 310 | 150 | 57% | N/A | N/A (in the terms of this paper) | 1 | |||
[8] | × | Orientation, magnetometer, accelerometer | 7/25/100 | 21/365/183 | 90.23% | 20 s | N/A | 1 | |||||||
[9] | × | App | Battery, CPU | Orientation, magnetometer, accelerometer, rotation | WiFi | Light | Device active, call history | 7/25/100 | 21/365/183 | 99.44% | >122 s | N/A | 1 | ||
[40] | (activity recogn.) | Accelerometer, barometer | 6 | 2.083333333 | 85.48% | N/A | N/A | 5 | |||||||
[31] | × | GPS | Acessed URLs–browser history, phone calls, SMS | 50 | 12 | N/A | With 95% probability, the adversary will be locked out after 16 or fewer usages of the device | N/A | 1 | ||||||
[41] | GPS | 10 | 28 | 86.6% | 30 minutes | N/A | 4 | ||||||||
[42] | × | Screen info | 18 | N/A | 97.33% | N/A | 2.03% FP, period unknown | - | |||||||
[43] | × | Screen info | 75 | N/A | 95.7% | 0.648 s | 7 | ||||||||
[44] | × | Accelerometer | 36 | 24 | 78.78% | 30 s | 3.97% FP, period unknown | Multiple | |||||||
[32] | × | Location | Camera, screen info | 48 | 60 | 65–95% | N/A | N/A | 1 (70%) | ||||||
[45] | Accelerometer, gyroscope | × | × | Smartwatch accelerometer | 6 | 2 | 97.4% | N/A | 1.12% FP, period unknown | 1 | |||||
[46] | × | Accelerometer, gyroscope | Screen info, audio | 10 | 7 | 91.67 | N/A | N/A (in the terms of this paper) | 1 | ||||||
[11] | × | Accelerometer, gyroscope, cell ID | × | Screen info, audio | 7 | N/A | >99% | N/A | >60% | 1 | |||||
[47] | × | Accelerometer, gyroscope | Screen info | n.a. | n.a. | N/A | N/A | N/A [t] | Multiple | ||||||
[48] | × | Screen info | 80 | n.a. | 99.99% | 99.99% [b] | - | ||||||||
[49] | × | Accelerometer, orientation | Screen info | 104 | N/A | 0.31 EER | N/A | N/A | - | ||||||
[50] | × | Screen info | 25 | n.a. | 0.04 EER | N/A | N/A | 1 | |||||||
[51] | × | Accelerometer, gyroscope and magnetometer | Camera | 10 | 70 | 73% | N/A | 1% FP, unknown period | - | ||||||
[52] | (activity recogn.) | Accelerometer, pressure | Audio | 30 | N/A | 94% | N/A | N/A | 1 | ||||||
[53] | × | Proximity, accelerometer, gyroscope, magnetometer | 16 | N/A | 96% | N/A | N/A | 1 | |||||||
[12] | × | App | Battery | Location | Cell ID, global Rx/Tx data | 7 | 21 | 72% | N/A | N/A | 1 | ||||
[54] | × | App CPU, transmitted data | Accelerometer and gyroscope | × | × | × | 8 | 240 | >99% | 1,5 min (average) | 1 false positive every 2 weeks | 1 | |||
[32] | × | App | GPS | WiFi | Times an app is visited, text through key board, browser history | 200 | 30 | 0.01 < EER < 0.05 | N/A | N/A | 1 (60%) | ||||
[33] | × | App | GPS | Cell ID, phone calls, SMS | 71 | 95.83% | N/A | 11.45% FP | - | ||||||
[55] | × | Battery | 645 | 28 | 60% (intermediate) | N/A | 42% FP | 1 (75%) | |||||||
[56] | × | Accelerometer, gyroscope | 24 | 14 | 96.3% | 2.4 ms | 7.6% | - | |||||||
[34] | × | Battery | GPS, accelerometer, magnetometer | Phone call | Audio, light, screen info | 15 | 3 | 0.25 < F1 score < 0.9 | N/A | N/A | 1 (80%) | ||||
[35] | × | Accelerometer, gyroscope | Involves smartwatches | 35 | 98.1% | 21 ms | 0.9% | 6 | |||||||
OURS | × | Battery | Global Rx/Tx data | Audio, light | 50 | 730 | 97.05% | 150 s (battery average with ) | Tunable with | Not needed |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
De Fuentes, J.M.; Gonzalez-Manzano, L.; Ribagorda, A. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 2018, 18, 1219. https://doi.org/10.3390/s18041219
De Fuentes JM, Gonzalez-Manzano L, Ribagorda A. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors. 2018; 18(4):1219. https://doi.org/10.3390/s18041219
Chicago/Turabian StyleDe Fuentes, Jose Maria, Lorena Gonzalez-Manzano, and Arturo Ribagorda. 2018. "Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors" Sensors 18, no. 4: 1219. https://doi.org/10.3390/s18041219
APA StyleDe Fuentes, J. M., Gonzalez-Manzano, L., & Ribagorda, A. (2018). Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors, 18(4), 1219. https://doi.org/10.3390/s18041219