Continuous User Authentication on Multiple Smart Devices
Abstract
:1. Introduction
- We propose an effective and efficient multi-device continuous authentication scheme that can complement the existing multi-device authentication mechanisms. Each device in the scheme is monitored continuously for user authentication, even when a user switches to another smart device.
- We find the relevance of multi-device behavioral data from the accelerometer and gyroscope sensors and transform the signal to two-dimensional images, which is the basis for learning users’ unique behavioral features through a spatiotemporal convolutional neural network.
- We present a dynamic confidence-based strategy for addressing the issue of insufficient stability and accuracy in multi-device authentication, which is appropriately adjusted for every device according to the situation of user authentication.
- We carried out experiments to evaluate the performance of our scheme. First, we checked the effectiveness of the user recognition model in a multi-device scenario and the result showed the recognition model improved the accuracy of smartphones and tablets to 97.9% and 96.3%, respectively, with FRR reduced to 0.02057 and 0.03695, and FAR reduced to 0.00108 and 0.00194 for smartphones and tablets, respectively. Then, we checked the effectiveness and efficiency of the confidence-based authentication. The experimental results showed that the approach achieved 99.8% and 99.2% user authentication accuracy on the smartphone and tablet, respectively, with false rejection rates of 0.0029 and 0.00808, respectively.
2. Related Work
3. Multi-Device Authentication Scheme
3.1. System Overview
3.2. Data Acquisition and Processing
3.2.1. Data Acquisition
3.2.2. Multi-Device Data Relationship Analysis
3.2.3. Multi-Device Data Processing
Algorithm 1 Frequency synchronization algorithm. |
Input: Sensor data for device : , is the number of devices; Duration of sensor data for device : . Output: The new data after interpolation. 1. Obtain the amount of sensor data for device : ; |
2. Obtain the actual acquisition frequency of the device : = |
3. Obtain maximum acquisition frequency: max(); |
4. Obtain the interpolated ratio for device : = ; |
5. Interpolation to obtain frequency-consistent signals: = interpolate (, ). |
3.3. Spatiotemporal Convolutional Neural Network
3.4. Input Scale Selection
3.5. Confidence-Based Strategy
3.6. User Authentication
4. Experimental Results
4.1. Evaluation Criteria
4.2. User Recognition across Multiple Devices
4.3. Confidence-Based User Authentication
4.4. Confidence-Based Strategy Adjustments
4.5. Compared to Existing Work
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Consumer Electronics—Statistics & Facts. Available online: https://www.statista.com/topics/4408/consumer-electronics/#topicOverview (accessed on 24 November 2022).
- Algaradi, T.S.; Rama, B. Big Data Security: A Progress Study of Current User Authentication Schemes. In Proceedings of the 2018 4th International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Mangalore, India, 6–8 September 2018; pp. 68–75. [Google Scholar]
- Breitinger, F.; Tully-Doyle, R.; Hassenfeldt, C. A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 2020, 88, 101647. [Google Scholar] [CrossRef]
- Acar, A.; Aksu, H.; Uluagac, A.S.; Akkaya, K. A Usable and Robust Continuous Authentication Framework Using Wearables. IEEE Trans. Mob. Comput. 2021, 20, 2140–2153. [Google Scholar] [CrossRef]
- Dee, T.; Richardson, I.; Tyagi, A. Continuous Transparent Mobile Device Touchscreen Soft Keyboard Biometric Authentication. In Proceedings of the 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), Delhi, India, 5–9 January 2019; pp. 539–540. [Google Scholar]
- Belman, A.K.; Phoha, V.V. DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices. In Proceedings of the 2020 International Conference on Artificial Intelligence and Signal Processing (AISP), Amaravati, India, 10–12 January 2020; pp. 1–6. [Google Scholar]
- Wang, X.; Yu, T.; Mengshoel, O.; Tague, P. Towards continuous and passive authentication across mobile devices: An empirical study. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 35–45. [Google Scholar]
- Incel, O.; Gunay, S.; Akan, Y.; Barlas, Y.; Basar, O.; Alptekin, G.; Isbilen, M. DAKOTA: Sensor and Touch Screen Based Continuous Authentication on a Mobile Banking Application. IEEE Access 2021, 9, 38943–38960. [Google Scholar] [CrossRef]
- Keykhaie, S.; Pierre, S. Mobile Match on Card Active Authentication Using Touchscreen Biometric. IEEE Trans. on Consum. Electron. 2020, 66, 376–385. [Google Scholar] [CrossRef]
- Ananya; Singh, S. Keystroke Dynamics for Continuous Authentication. In Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 11–12 January 2018; pp. 205–208. [Google Scholar]
- Lu, L.; Yu, J.; Chen, Y.; Liu, H.; Zhu, Y.; Kong, L.; Li, M. Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones. IEEE/ACM Trans. Netw. 2019, 27, 447–460. [Google Scholar] [CrossRef]
- Shuwandy, M.; Aljubory, H.; Mohammed Hammash, N.; Salih, M.; Altaha, M.; Alqaisy, Z. BAWS3TS: Browsing Authentication Web-Based Smartphone Using 3D Touchscreen Sensor. In Proceedings of the 2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA), Selangor, Malaysia, 11 May 2022; pp. 425–430. [Google Scholar]
- Chen, Y.; Shen, C.; Wang, Z.; Yu, T. Modeling interactive sensor-behavior with smartphones for implicit and active user authentication. In Proceedings of the 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA), New Delhi, India, 22–24 February 2017; pp. 1–6. [Google Scholar]
- Vhaduri, S.; Dibbo, S.; Cheung, W. HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics. IEEE Access 2021, 9, 116395–116406. [Google Scholar] [CrossRef]
- Abuhamad, M.; Abuhmed, T.; Mohaisen, D.A.; Nyang, D. AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 2020, 7, 5008–5020. [Google Scholar] [CrossRef]
- Luzbashev, A.; Filippov, A.; Kogos, K. Continuous User Authentication in Mobile Phone Browser Based on Gesture Characteristics. In Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 30–31 October 2018; pp. 90–95. [Google Scholar]
- Dybczak, J.; Nawrocki, P. Continuous authentication on mobile devices using behavioral biometrics. In Proceedings of the 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16–19 May 2022; pp. 1028–1035. [Google Scholar]
- Herath, C.; Dulanga, K.G.C.; Tharindu, N.V.D.; Ganegoda, G.U. Continuous User Authentication using Keystroke Dynamics for Touch Devices. In Proceedings of the 2022 2nd International Conference on Image Processing and Robotics (ICIPRob), Colombo, Sri Lanka, 12–13 March 2022; pp. 1–6. [Google Scholar]
- Ali, Z.; Payton, J. Task-Based Continuous Authentication Using Wrist-Worn Devices. In Proceedings of the 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops), Kassel, Germany, 22 March 2021; pp. 642–647. [Google Scholar]
- Baek, D.; Musale, P. You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems. IEEE Access 2019, 7, 37883–37895. [Google Scholar] [CrossRef]
- Sprager, S.; Juric, M.B. Inertial Sensor-Based Gait Recognition: A Review. Sensors 2015, 15, 22089–22127. [Google Scholar] [CrossRef] [PubMed]
- Bianchi, A.; Oakley, I. Wearable authentication: Trends and opportunities. Inf. Technol. 2016, 58. [Google Scholar] [CrossRef]
- Abuhamad, M.; Abusnaina, A.; Nyang, D.; Mohaisen, D. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet Things J. 2021, 8, 65–84. [Google Scholar] [CrossRef]
- Li, H.; Yu, J.; Cao, Q. Intelligent Walk Authentication: Implicit Authentication When You Walk with Smartphone. In Proceedings of the 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Madrid, Spain, 3–6 December 2018; pp. 1113–1116. [Google Scholar]
- Lee, W.-H.; Lee, R. Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. In Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, Seoul, Republic of Korea, 18 June 2016; p. 9. [Google Scholar]
- Zou, Q.; Wang, Y.; Wang, Q.; Zhao, Y.; Li, Q. Deep Learning-Based Gait Recognition Using Smartphones in the Wild. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3197–3212. [Google Scholar] [CrossRef]
- Dai, D.; Chen, W.; Jiang, S.; Wang, R.; Tao, D. An Implicit Authentication Solution based on User’s Keystroke Behavior of Smartphone Usage. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics—Taiwan (ICCE-TW), Yilan, Taiwan, 20–22 May 2019; pp. 1–2. [Google Scholar]
- Zhu, T.; Weng, Z.; Song, Q.; Chen, Y.; Liu, Q.; Chen, Y.; Lv, M.; Chen, T. EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment. IEEE Trans. Mob. Comput. 2022, 21, 555–572. [Google Scholar] [CrossRef]
- Wang, R.; Tao, D. Context-Aware Implicit Authentication of Smartphone Users Based on Multi-Sensor Behavior. IEEE Access 2019, 7, 119654–119667. [Google Scholar] [CrossRef]
- Anguita, D.; Ghio, A.; Oneto, L.; Parra, X.; Reyes-Ortiz, J.L. A Public Domain Dataset for Human Activity Recognition using Smartphones. In Proceedings of the The European Symposium on Artificial Neural Networks, Bruges, Belgium, 24–26 April 2013. [Google Scholar]
- Micucci, D.; Mobilio, M.; Napoletano, P. UniMiB SHAR: A Dataset for Human Activity Recognition Using Acceleration Data from Smartphones. Appl. Sci. 2017, 7, 1101. [Google Scholar] [CrossRef]
- Zhu, T.; Qu, Z.; Xu, H.; Zhang, J.; Shao, Z.; Chen, Y.; Prabhakar, S.; Yang, J. RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild. IEEE Trans. Mob. Comput. 2020, 19, 466–483. [Google Scholar] [CrossRef]
- Sun, F.; Mao, C.; Fan, X.; Li, Y. Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices. IEEE Internet Things J. 2019, 6, 820–830. [Google Scholar] [CrossRef]
- Zhu, J.; Wu, P.; Wang, X.; Zhang, J. SenSec: Mobile security through passive sensing. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, USA, 28–31 January 2013; pp. 1128–1133. [Google Scholar]
- Ehatisham-ul-Haq, M.; Awais Azam, M.; Naeem, U.; Amin, Y.; Loo, J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 2018, 109, 24–35. [Google Scholar] [CrossRef]
- Amini, S.; Noroozi, V.; Pande, A.; Gupte, S.; Yu, P.S.; Kanich, C. DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management 2018, Torino, Italy, 22–26 October 2018. [Google Scholar]
Device | Accelerometer | Gyroscope | Network and Transmission (Bluetooth or WIFI) |
---|---|---|---|
Smartphone | Available | Available | Available |
Tablet | Available | Available | Available |
Smartwatch | Available | Available | Available |
Smart bracelet | Available | Optional | Available |
Experimental Setup Item | Settings |
---|---|
Number of Experimenters | 20 |
Behavior | Handheld walk |
Duration | Approx. 25 mins for each device |
Age Group | 21 years to 30 years |
Gender | Female: 9; Male: 11 |
Time Spread | Approx. 3 months |
Experimental Equipment | LLD-AL00, KJR-W09 |
Acquisition Frequency | 100 Hz |
Input Size | Device for Recognition | Scenarios | Recognition Accuracy |
---|---|---|---|
Smartphone | Single-device | 0.883 | |
Multi-device | 0.871 | ||
Tablet | Single-device | 0.865 | |
Multi-device | 0.845 | ||
Smartphone | Single-device | 0.967 | |
Multi-device | 0.979 | ||
Tablet | Single-device | 0.952 | |
Multi-device | 0.963 |
Device for Recognition | Scenarios | FRR | FAR | Accuracy |
---|---|---|---|---|
Smartphone | Single-device | 0.03314 | 0.0174 | 0.967 |
Multi-device | 0.02057 | 0.00108 | 0.979 | |
Tablet | Single-device | 0.0485 | 0.00255 | 0.9515 |
Multi-device | 0.03695 | 0.00194 | 0.963 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, Y.; Zhang, X.; Hu, H. Continuous User Authentication on Multiple Smart Devices. Information 2023, 14, 274. https://doi.org/10.3390/info14050274
Wang Y, Zhang X, Hu H. Continuous User Authentication on Multiple Smart Devices. Information. 2023; 14(5):274. https://doi.org/10.3390/info14050274
Chicago/Turabian StyleWang, Yajie, Xiaomei Zhang, and Haomin Hu. 2023. "Continuous User Authentication on Multiple Smart Devices" Information 14, no. 5: 274. https://doi.org/10.3390/info14050274
APA StyleWang, Y., Zhang, X., & Hu, H. (2023). Continuous User Authentication on Multiple Smart Devices. Information, 14(5), 274. https://doi.org/10.3390/info14050274