Abstract
This paper proposes an approach to carrying out context data preprocessing gathered from smartphone users to support context-aware authentication. Context-aware authentication is a technique to implicitly authenticate a smartphone user using contextual data (e.g., call log, location) without explicitly requesting the user’s any actions. In order to enable context-aware authentication, a user’s contextual data should be carefully processed for learning user’s past contextual patterns in consideration of user’s hourly, daily, weekly or monthly behaviors. In this paper, we gathered contextual data from 200 voluntary smartphone users for about 2 years and showed what the appropriate contextual data is preprocessing for performing context-aware authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of SACMAT (2009)
Hulsebosch, J.R., Salden, H.A., Bargh, S.M., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of SACMAT (2005)
Nachenberg, C.: A window into mobile device security: examining the security approaches employ. SSR (2011)
Whitney, L.: Smartphones to dominate PCs in Gartner forecast. CNET Business Tech News (2010)
Rainie, L., Anderson, J.: The Future of the Internet III. Pew Internet Project (2008)
Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smartphone. TrustCom (2012)
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit authentication through learning user behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-18178-8_9
Markus, J., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. USENIX (2009)
Hilmi, G.K., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. MoST (2014)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Huang, C.-Y., Ma, S.-P., Chen, K.-T.: Using one-time passwords to prevent password phishing attacks. J. Netw. Comput. Appl. 34(4), 1292–1301 (2011)
Xi, K., et al.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Netw. 4(5), 487–499 (2011)
Nilesh, A., Salendra, P., et al.: A review of authentication methods. Int. J. Sci. Technol. Res. 5(11), 246–249 (2016)
Bhatia, R.: Biometrics and face recognition techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 93–96 (2013)
Kak, N., Gupta, R.: Iris recognition system. Int. J. Adv. Comput. Sci. Appl. 1, 34–40 (2010)
Hartigan, J.A., Wong, M.A.: A k-means clustering algorithm. J. Roy. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100–108 (1979)
William, H.E.D., Edelsbrunner, H.: Efficient algorithms for agglomerative hierarchical clustering methods. J. Classif. 1, 7–24 (1984)
Snedecor, G.W., Cochran, W.G.: Statistical Methods. 8th edn. Lowa state University Press (1989)
Shen, Q., Faraway, J.: An f test for linear models with functional responses. Statistica Sinica 14, 1239–1257 (2004)
Mobile Data Challenge (MDC) Dataset: Dataset Distribution Portal. https://www.idiap.ch/dataset/mdc. Accessed 6 Feb 2019
Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Nam, S., Kim, S., Shin, JH., Kim, J.A., Park, S. (2019). Context Data Preprocessing for Context-Aware Smartphone Authentication. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11623. Springer, Cham. https://doi.org/10.1007/978-3-030-24308-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-24308-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24307-4
Online ISBN: 978-3-030-24308-1
eBook Packages: Computer ScienceComputer Science (R0)