Skip to main content

Context Data Preprocessing for Context-Aware Smartphone Authentication

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2019 (ICCSA 2019)

Abstract

This paper proposes an approach to carrying out context data preprocessing gathered from smartphone users to support context-aware authentication. Context-aware authentication is a technique to implicitly authenticate a smartphone user using contextual data (e.g., call log, location) without explicitly requesting the user’s any actions. In order to enable context-aware authentication, a user’s contextual data should be carefully processed for learning user’s past contextual patterns in consideration of user’s hourly, daily, weekly or monthly behaviors. In this paper, we gathered contextual data from 200 voluntary smartphone users for about 2 years and showed what the appropriate contextual data is preprocessing for performing context-aware authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of SACMAT (2009)

    Google Scholar 

  2. Hulsebosch, J.R., Salden, H.A., Bargh, S.M., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of SACMAT (2005)

    Google Scholar 

  3. Nachenberg, C.: A window into mobile device security: examining the security approaches employ. SSR (2011)

    Google Scholar 

  4. Whitney, L.: Smartphones to dominate PCs in Gartner forecast. CNET Business Tech News (2010)

    Google Scholar 

  5. Rainie, L., Anderson, J.: The Future of the Internet III. Pew Internet Project (2008)

    Google Scholar 

  6. Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smartphone. TrustCom (2012)

    Google Scholar 

  7. Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_9

    Chapter  Google Scholar 

  8. Markus, J., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. USENIX (2009)

    Google Scholar 

  9. Hilmi, G.K., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. MoST (2014)

    Google Scholar 

  10. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  Google Scholar 

  11. Huang, C.-Y., Ma, S.-P., Chen, K.-T.: Using one-time passwords to prevent password phishing attacks. J. Netw. Comput. Appl. 34(4), 1292–1301 (2011)

    Article  Google Scholar 

  12. Xi, K., et al.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Netw. 4(5), 487–499 (2011)

    Article  Google Scholar 

  13. Nilesh, A., Salendra, P., et al.: A review of authentication methods. Int. J. Sci. Technol. Res. 5(11), 246–249 (2016)

    Google Scholar 

  14. Bhatia, R.: Biometrics and face recognition techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 93–96 (2013)

    Google Scholar 

  15. Kak, N., Gupta, R.: Iris recognition system. Int. J. Adv. Comput. Sci. Appl. 1, 34–40 (2010)

    Google Scholar 

  16. Hartigan, J.A., Wong, M.A.: A k-means clustering algorithm. J. Roy. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100–108 (1979)

    Google Scholar 

  17. William, H.E.D., Edelsbrunner, H.: Efficient algorithms for agglomerative hierarchical clustering methods. J. Classif. 1, 7–24 (1984)

    Article  Google Scholar 

  18. Snedecor, G.W., Cochran, W.G.: Statistical Methods. 8th edn. Lowa state University Press (1989)

    Google Scholar 

  19. Shen, Q., Faraway, J.: An f test for linear models with functional responses. Statistica Sinica 14, 1239–1257 (2004)

    MathSciNet  MATH  Google Scholar 

  20. Mobile Data Challenge (MDC) Dataset: Dataset Distribution Portal. https://www.idiap.ch/dataset/mdc. Accessed 6 Feb 2019

  21. Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suntae Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nam, S., Kim, S., Shin, JH., Kim, J.A., Park, S. (2019). Context Data Preprocessing for Context-Aware Smartphone Authentication. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11623. Springer, Cham. https://doi.org/10.1007/978-3-030-24308-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24308-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24307-4

  • Online ISBN: 978-3-030-24308-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics