Abstract
We show that accelerometers, touch screens and software keyboards, which are standard components of modern mobile phones, can be used to differentiate different test subjects based on the unique interaction characteristics of each subject. This differentiation ability can be applied to authenticate individuals under a continuous authentication scheme. Based on six 15 minute data sets collected from the test subjects utilizing our data collection platform, we extract multiple features from the data and show an ability to accurately identify individuals at a rate of 83 percent using a simple normal distribution of each feature.
Chapter PDF
Similar content being viewed by others
Keywords
References
Mcafee, McAfee Threats Report: Second Quarter 2011 (2011)
Boyle, M., Klausner, A., Starobinski, D., Trachtenberg, A., Wu, H.: Gait-based User Classification Using Phone Sensors. ipsit.bu.edu, pp. 395–396, http://ipsit.bu.edu/documents/mobisys11.pdf
Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S., Ailisto, H.: Identifying users of portable devices from gait pattern with accelerometers. In: IEEE International Conference on Acoustics, Speech, and Signal Processing, Proceedings(ICASSP 2005), vol. 2, pp. ii–973. IEEE (2005), http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1415569
Gafurov, D., Helkala, K., Søndrol, T.: Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers 1(7), 51–59 (2006), http://academypublisher.com/ojs/index.php/jcp/article/view/277
Gafurov, D., Snekkenes, E.: Gait Recognition Using Wearable Motion Recording Sensors. EURASIP Journal on Advances in Signal Processing 2009, 1–17 (2009), http://www.hindawi.com/journals/asp/2009/415817.html
Bächlin, M., Schumm, J., Roggen, D., Töster, G.: Quantifying gait similarity: User authentication and real-world challenge. Advances in Biometrics, 1040–1049 (2009), http://www.springerlink.com/index/WJ43150286835587.pdf
Ketabdar, H., Roshandel, M., Skripko, D.: Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis. Interactions, 188–191 (2011)
Kwapisz, J., Weiss, G., Moore, S.: Cell phone-based biometric identification. In: 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1–7. IEEE (2010), http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5634532
Chang, K.-h., Hightower, J., Kveton, B.: Inferring identity using accelerometers in television remote controls. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 151–167. Springer, Heidelberg (2009)
Furnell, N.L.C.S.M.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1–14 (2007)
Zahid, S., Shahzad, M., Khayam, S.A., Farooq, M.: Keystroke-based User Identification on Smart Phones. Technology, 1–18
Hwang, S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Computers Security 28(1-2), 85–93 (2009), http://linkinghub.elsevier.com/retrieve/pii/S0167404808000965
Maiorana, E., Campisi, P., González-carballo, N., Neri, A.: Keystroke Dynamics Authentication for Mobile Phones. In: SAC, pp. 21–26 (2011)
Saevanee, H., Bhattarakosol, P.: Authenticating user using keystroke dynamics and finger pressure. In: Identity, pp. 1–2 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wolff, M. (2013). Behavioral Biometric Identification on Mobile Devices. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Foundations of Augmented Cognition. AC 2013. Lecture Notes in Computer Science(), vol 8027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39454-6_84
Download citation
DOI: https://doi.org/10.1007/978-3-642-39454-6_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39453-9
Online ISBN: 978-3-642-39454-6
eBook Packages: Computer ScienceComputer Science (R0)