Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning
Abstract
:1. Introduction
- (1)
- (2)
- Label noise is widely present in the training phase, e.g., device owners lend their phones to others. Most research has paid more attention to signal denoising, but less to reducing label noise [9,10]. If a classifier is trained with incorrect labels, continuous errors can accumulate. Even if labeled samples are obtained from the target person, the classifier may still fail to authenticate the device owner.
- (3)
- The quality of handmade features is crucial for the performance of most classifiers. However, when dealing with complex mixed motion sensor signals, relying solely on statistical features can lead to critical information loss [7,11,12,13]. Additionally, the feature extraction process is typically fixed by the determined algorithm, whereas iterative optimization can be used to update the parameters of the classification model. This can hinder the improvement of algorithms for sensor-based mobile user authentication.
- (1)
- A 2D image encoding method, ST-SVD, is proposed for 1D time-series signals by using a multi-resolution analysis. This method combines S-transform (ST) and singular value decomposition (SVD) to obtain an optimal S-matrix to enhance the time-frequency characteristics of sensory signals. Then, it allows CNN to learn high-level features. Moreover, this method takes into account the spatio-temporal properties of sensory signals.
- (2)
- A semi-supervised Teacher–Student (TS) tri-training algorithm is proposed to address label noise in real-world motion sensor datasets. This algorithm effectively eliminates the negative impact of noisy labels and provides high-quality training data for the model.
- (3)
- Integrating the aforementioned methods, we design a system with a client–server (C-S) architecture. Experimental results on large-scale real-world datasets demonstrate that the proposed system achieves a high authentication accuracy, outperforming existing state-of-the-art methods.
2. Related Work
3. Methodology
3.1. Overview Framework
- Collecting mobile user authentication data. The sensor data are collected through human–computer interaction between users and mobile devices.
- Executing 2D optimal S-matrix coding with singular value decomposition (SVD) and S-transform (ST). In this approach, the 1D time-series signals are transformed into 2D matrix features with ST first. Then, SVD is applied to the S-matrix to enhance user micro features.
- Filtering mislabeled data and using Teacher–Student (TS) tri-training to correct mislabeled data during training. This step can further improve the quality of the training dataset.
- Using a Convolutional Neural Network (CNN) model to extract features from 2D optimal S-matrix images. The trained CNN model is used to authenticate whether the user is the device owner.
3.2. Sensory Signal Collecting
3.3. Sensory Signal with 2D Coding Conversion
3.4. Label Correction with TS Tri-Training
3.5. Convolutional Neural Networks Construction
4. Experimental Evaluations
4.1. Dataset
4.2. Evaluation Metrics
4.3. Performance of ST-SVD on Sensory Signals
4.4. Overall Accuracy on Large-Scale Dataset
4.5. Performance on Noisy Labels Elimination
4.6. Evaluation of Computational Cost
4.7. Anti-Attack Capability Assessment
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Store Intelligence Data Digest Report. 2022. Available online: https://sensortower.com/resources (accessed on 6 July 2023).
- Mobile Application Market Size, Share & Trends Report. 2030. Available online: https://www.grandviewresearch.com/industry-analysis/mobile-application-market (accessed on 6 July 2023).
- Alhakami, H.; Alhrbi, S. Knowledge based Authentication Techniques and Challenges. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 1–6. [Google Scholar] [CrossRef]
- Dee, T.; Richardson, I.; Tyagi, A. Continuous nonintrusive mobile device soft keyboard biometric authentication. Cryptography 2022, 6, 14. [Google Scholar] [CrossRef]
- Bošnjak, L.; Brumen, B. Examining security and usability aspects of knowledge-based authentication methods. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, Opatija, Croatia, 20–24 May 2019. [Google Scholar]
- Ray-Dowling, A.; Hou, D.; Schuckers, S. Stationary mobile behavioral biometrics: A survey. Comput. Secur. 2023, 128, 103184. [Google Scholar] [CrossRef]
- Zhu, T.; Qu, Z.; Xu, H.; Zhang, J.; Shao, Z.; Chen, Y.; Yang, J. RiskCog: Unobtrusive real-time user authentication on mobile devices in the wild. IEEE Trans. Mob. Comput. 2019, 19, 466–483. [Google Scholar] [CrossRef]
- Ren, Y.; Chen, Y.; Chuah, M.C.; Yang, J. User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. 2015, 14, 1961–1974. [Google Scholar] [CrossRef]
- Zhu, T.; Weng, Z.; Song, Q.; Chen, Y.; Liu, Q.; Chen, Y.; Chen, T. Espialcog: General, efficient and robust mobile user implicit authentication in noisy environment. IEEE Trans. Mob. Comput. 2020, 21, 555–572. [Google Scholar] [CrossRef]
- Zhu, T.; Weng, Z.; Chen, G.; Fu, L. A hybrid deep learning system for real-world mobile user authentication using motion sensors. Sensors 2020, 20, 3876. [Google Scholar] [CrossRef] [PubMed]
- Sitová, Z.; Šeděnka, J.; Yang, Q.; Peng, G.; Zhou, G.; Gasti, P.; Balagani, K.S. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Info. Forensics Secur. 2015, 11, 877–892. [Google Scholar] [CrossRef]
- Shen, C.; Li, Y.; Chen, Y.; Guan, X.; Maxion, R.A. Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Trans. Info. Forensics Secur. 2017, 13, 48–62. [Google Scholar] [CrossRef]
- Lee, W.H.; Lee, R.B. Multi-sensor authentication to improve smartphone security. In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), Angers, France, 9–11 February 2015; pp. 1–11. [Google Scholar]
- Stockwell, R.G.; Mansinha, L.; Lowe, R.P. Localization of the complex spectrum: The S transform. IEEE Trans. Sig. Proc. 1996, 44, 998–1001. [Google Scholar] [CrossRef]
- Zoebisch, F.; Vielhauer, C. A test tool to support brute-force online and offline signature forgery tests on mobile devices. In Proceedings of the 2003 International Conference on Multimedia and Expo(ICME), Baltimore, MD, USA, 6–9 July 2003; p. III-225. [Google Scholar]
- Aviv, A.J.; Gibson, K.; Mossop, E.; Blaze, M.; Smith, J.M. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies, Berkeley, CA, USA, 23–25 June 2010; pp. 1–7. [Google Scholar]
- Zakaria, N.H.; Griffiths, D.; Brostoff, S.; Yan, J. Shoulder surfing defence for recall-based graphical passwords. In Proceedings of the Seventh Symposium on Usable Privacy and Security, Washington, DC, USA, 20–22 July 2011; pp. 1–12. [Google Scholar]
- Xu, Z.; Bai, K.; Zhu, S. Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, NY, USA, 16–18 April 2012; pp. 113–124. [Google Scholar]
- Bianchi, A.; Fratantonio, Y.; Machiry, A.; Kruegel, C.; Vigna, G.; Chung, S.P.H.; Lee, W. Broken fingers: On the usage of the fingerprint API in android. In Proceedings of the NDSS, San Diego, CA, USA, 18–21 February 2018; pp. 1–15. [Google Scholar]
- Sharif, M.; Bhagavatula, S.; Bauer, L.; Reiter, M.K. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM Sigsac Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 1–12. [Google Scholar]
- Goswami, G.; Ratha, N.; Agarwal, A.; Singh, R.; Vatsa, M. Unravelling robustness of deep learning based face recognition against adversarial attacks. In Proceedings of the AAAI Conference on Artificial Intelligence, New Orleans, LA, USA, 2–7 February 2018; pp. 1–8. [Google Scholar]
- Kwapisz, J.R.; Weiss, G.M.; Moore, S.A. Cell phone-based biometric identification. In Proceedings of the 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, USA, 27–29 September 2010; pp. 1–7. [Google Scholar]
- Ho, C.C.; Eswaran, C.; Ng, K.W.; Leow, J.Y. An unobtrusive android person verification using accelerometer based gait. In Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, 28–30 November 2012; pp. 271–274. [Google Scholar]
- Zhu, J.; Wu, P.; Wang, X.; Zhang, J. Sensec: Mobile security through passive sensing. In Proceedings of the 2013 International Conference on Computing, Networking and Communications, San Diego, CA, USA, 28–31 January 2013; pp. 1128–1133. [Google Scholar]
- Lu, H.; Huang, J.; Saha, T.; Nachman, L. Unobtrusive gait verification for mobile phones. In Proceedings of the 2014 ACM International Symposium on Wearable Computers, Seattle, WA, USA, 13–17 September 2014; pp. 91–98. [Google Scholar]
- Lee, W.H.; Liu, X.; Shen, Y.; Jin, H.; Lee, R.B. Secure pick up: Implicit authentication when you start using the smartphone. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, Indianapolis, IN, USA, 21–23 June 2017; 2017; pp. 67–78. [Google Scholar]
- Buriro, A.B.; Crispo, B.; Zhauniarovich, Y. Please hold on: Unobtrusive user authentication using smartphone’s built-in sensors. In Proceedings of the 2017 IEEE International Conference on Identity, Security and Behavior Analysis, New Delhi, India, 22–24 February 2017; pp. 1–8. [Google Scholar]
- Amirou, A.; Amirou, Y.; Ould-Abdeslam, D. S-Transform with a Compact Support Kernel and Classification Models Based Power Quality Recognition. J. Electr. Eng. Technol. 2022, 17, 2061–2070. [Google Scholar] [CrossRef]
- Zhou, Z.H.; Li, M. Tri-training: Exploiting unlabeled data using three classifiers. IEEE Trans. Knowl. Data Eng. 2005, 17, 1529–1541. [Google Scholar] [CrossRef]
- Wang, S.; Guo, Y.; Hua, W.; Liu, X.; Song, G.; Hou, B.; Jiao, L. Semi-supervised PolSAR image classification based on improved tri-training with a minimum spanning tree. IEEE Trans. Geosci. Remote Sens. 2020, 58, 8583–8597. [Google Scholar] [CrossRef]
- Emmagee. 2018. Available online: https://github.com/NetEase/Emmagee (accessed on 6 July 2023).
Layer | Input Shape | Structure | Output Shape |
---|---|---|---|
Input | 9 × 150 | - | 9 × 100 × 150 |
CL1 | 9 × 100 × 150 | 20@(2 × 3) | 20@(24 × 148) |
MP1 | 20@(24 × 148) | 2 × 4 | 20@(12 × 37) |
CL2 | 50@(12 × 37) | 50@(3 × 8) | 50@(10 × 30) |
MP2 | 50@(10 × 30) | 2 × 6 | 50@(5 × 5) |
FC | 750 × 1 | 256 × 1 | 256 × 1 |
Output | 256 × 1 | 2 × 1 | 2 × 1 |
Method/Index | TPR | TNR | Accuracy | F1-Score |
---|---|---|---|---|
With TS tri-training | 74.56% | 98.13% | 96.32% | 0.9514 |
Without TS tri-training | 72.22% | 92.68% | 92.89% | 0.9159 |
Classifier | TPR | TNR | Accuracy | F1-Score |
---|---|---|---|---|
ST-SVD+CNN (Ours) | 74.56% | 98.13% | 96.32% | 0.9514 |
LSTM [9] | 74.35% | 97.60% | 95.58% | 0.9420 |
CNN+SVM(binary-class) [10] | 74.26% | 97.31% | 95.01% | 0.9375 |
SVM(binary-class) [7] | 73.59% | 96.42% | 94.67% | 0.9304 |
HMM [12] | 71.74% | 91.98% | 90.54% | 0.8896 |
Random forest [27] | 72.38% | 93.95% | 92.36% | 0.9132 |
DTW [26] | 66.18% | 89.60% | 86.49% | 0.8472 |
SVM(one-class) [11] | 66.25% | 89.64% | 86.51% | 0.8490 |
Before TS Tri-Training | |||||
# of Training Set | 480,000 | 480,000 | 480,000 | 480,000 | 480,000 |
Noisy Label Ratios | 5% | 15% | 25% | 35% | 45% |
False Labels in Training Set | 24,000 | 72,000 | 120,000 | 168,000 | 216,000 |
After TS tri-training | |||||
# of Training Set | 480,000 | 480,000 | 480,000 | 480,000 | 480,000 |
Noisy Label Ratios | 0.35% | 0.68% | 1.82% | 4.53% | 18.22% |
False Labels in Training Set | 1682 | 3264 | 7836 | 21,744 | 87,456 |
User Authentication Result(Before TS tri-training) | |||||
Accuracy | 93.85% | 84.25% | 76.37% | 68.30% | 53.09% |
User Authentication Result (After TS tri-training) | |||||
Accuracy | 96.28% | 96.12% | 95.25% | 94.03% | 81.42% |
Phone Model | Battery Consumption (mAh) | Data Collection | Authentication | ||
---|---|---|---|---|---|
CPU (%) | Memory (MB) | CPU (%) | Memory (MB) | ||
Samsung S20 | 105.22/4000 | 1.20 | 11.05 | 6.38 | 69.38 |
Vivo Xplay 6 | 110.50/4080 | 1.22 | 11.12 | 6.21 | 65.26 |
M18 | 119.25/3400 | 1.25 | 11.09 | 6.46 | 72.64 |
Procedure | Average Time (ms) |
---|---|
Data collection | 3003.12 |
ST-SVD | 199.58 |
Authentication | 27.90 |
Overall | 3230.60 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Weng, Z.; Wu, S.; Wang, Q.; Zhu, T. Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning. Mathematics 2023, 11, 3708. https://doi.org/10.3390/math11173708
Weng Z, Wu S, Wang Q, Zhu T. Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning. Mathematics. 2023; 11(17):3708. https://doi.org/10.3390/math11173708
Chicago/Turabian StyleWeng, Zhengqiu, Shuying Wu, Qiang Wang, and Tiantian Zhu. 2023. "Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning" Mathematics 11, no. 17: 3708. https://doi.org/10.3390/math11173708
APA StyleWeng, Z., Wu, S., Wang, Q., & Zhu, T. (2023). Enhancing Sensor-Based Mobile User Authentication in a Complex Environment by Deep Learning. Mathematics, 11(17), 3708. https://doi.org/10.3390/math11173708