Advertisement

Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns

Chapter
  • 209 Downloads
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

In this chapter we evaluate mobile active authentication based on an ensemble of biometrics and behavior-based profiling signals. We consider seven different data channels and their combination. Touch dynamics (touch gestures and keystroking), accelerometer, gyroscope, WiFi, GPS location and app usage are all collected during human-mobile interaction to authenticate the users. We evaluate two approaches: one-time authentication and active authentication. In one-time authentication, we employ the information of all channels available during one session. For active authentication we take advantage of mobile user behavior across multiple sessions by updating a confidence value of the authentication score. Our experiments are conducted on the semi-uncontrolled UMDAA-02 database. This database comprises of smartphone sensor signals acquired during natural human-mobile interaction. Our results show that different traits can be complementary in terms of mobile user authentication and multimodal systems clearly increase the performance when compared to individual biometrics systems with accuracies ranging from 82.2% to 98.0% depending on the authentication scenario.

Keywords

Mobile authentication Multimodal approaches Behavioral patterns Behavioral-based profiling Touch dynamics 

Notes

Acknowledgments

This work was funded by the projects BIBECA (RTI2018-101248-B-I00 MINECO/FEDER) and Bio-Guard (Ayudas Fundación BBVA a Equipos de Investigación Científica 2017), and by CECABANK.

References

  1. 1.
    Radicati S (2018) Mobile statistics report, 2014–2018. The Radicati Group, INC. A Techonology Market Research Firm, Palo AltoGoogle Scholar
  2. 2.
    Cho G, Huh JH, Cho J, Oh S, Song Y, Kim H (2017) SysPal: system-guided pattern locks for android. In: Proceedings of IEEE Symposium on Security and Privacy, California, UEGoogle Scholar
  3. 3.
    Harbach M, von Zezschwitz E, Fichtner A, Luca AD, Smith M (2014) It’s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Proceedings of symposium on usable privacy and security, California, USAGoogle Scholar
  4. 4.
    Molla R (2018) Mary Meeker’s 2018 internet trends report: all the slides, plus analysis. In RecodeGoogle Scholar
  5. 5.
    Martinez-Diaz M, Fierrez J, Galbally J (2016) Graphical password-based user authentication with free-form doodles. IEEE Trans Human-Machine Syst 46(4):607–661CrossRefGoogle Scholar
  6. 6.
    Crouse D, Han H, Chandra D, Barbello B, Jain AK (2015) Continuous authentication of Mobile user: fusion of face image and inertial measurement unit data. In: Proceedings of IAPR international conference on biometrics, Phuket, ThailandGoogle Scholar
  7. 7.
    Patel VM, Chellappa R, Chandra D, Barbello B (2016) Continuous user authentication on mobile devices: recent progress and remaining challenges. IEEE Signal Process Mag 33(4):49–61CrossRefGoogle Scholar
  8. 8.
    Mahbub U, Sarkar S, Patel VM, Chellappa R (2016) Active user authentication for smartphones: a challenge data set and benchmark results. In: Proceedings of IEEE 8th international conference on biometrics theory, applications and systems, New York, USAGoogle Scholar
  9. 9.
    Fierrez J, Pozo A, Martinez-Diaz M, Galbally J, Morales A (2018) Benchmarking touchscreen biometrics for Mobile authentication. IEEE Trans Inf Forensics Sec 13(11):2720–2733CrossRefGoogle Scholar
  10. 10.
    G. Li and P. Bours (2018). Studying WiFi and accelerometer data based authentication method on mobile phones. In: Proceedings of 2nd international conference on biometric engineering and applications, Amsterdam, NetherlandsGoogle Scholar
  11. 11.
    Buschek D, De Luca A, Alt F (2015) Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of 33rd annual ACM conference on human factors in computing systems, Seoul, Republic of KoreaGoogle Scholar
  12. 12.
    Li G, Bours P (2018) A novel mobilephone application authentication approach based on accelerometer and gyroscope data. In: Proceedings of 17th international conference of the biometrics specials interest group, Fraunhofer, GermanyGoogle Scholar
  13. 13.
    Mahbub U, Chellappa R (2016) PATH: person authentication using trace histories. In: Proceedings of ubiquitous computing, electronics & mobile communication conference, IEEE, New York, USAGoogle Scholar
  14. 14.
    Mahbub U, Komulainen J, Ferreira D, Chellappa R (2018) Continuous authentication of smartphones based on application usage. IEEE Transactions on Biometrics, Behavior, and Identity Science 1(3):165–180Google Scholar
  15. 15.
    Monaco JV, Tappert CC (2018) The partially observable hidden Markov model and its application to keystroke dynamics. Pattern Recogn 76:449–462CrossRefGoogle Scholar
  16. 16.
    Fierrez J, Morales A, Vera-Rodriguez R, Camacho D (2018) Multiple classifiers in biometrics. Part 2: trends and challenges. Inf Fusion 44:103–112CrossRefGoogle Scholar
  17. 17.
    Marcel S, Nixon MS, Fierrez J, Evans N (2019) Handbook of biometric anti-spoofing. presentation attack detection, Advances in computer vision and pattern recognition. Springer, ChamCrossRefGoogle Scholar
  18. 18.
    Shi W, Yang J, Jiang Y, Yang F, Xiong Y (2011) Senguard: passive user identification on smartphones using multiple sensors. In: Proceedings of 7th IEEE international conference on wireless and mobile computing, networking and communications, Shangai, China, pp 141–148Google Scholar
  19. 19.
    Fridman L, Weber S, Greenstadt R, Kam M (2015) Active authentication on mobile devices via stylometry, GPS location, web browsing behavior, and application usage patterns. IEEE Syst J 11(2):513–521CrossRefGoogle Scholar
  20. 20.
    Liu X, Shen C, Chen Y (2018) Multi-source interactive behavior analysis for continuous user authentication on smartphones. In: Proceedings of Chinese conference on biometric recognition, Urumchi, ChinaGoogle Scholar
  21. 21.
    Li G, Bours P (2018) A mobile app authentication approach by fusing the scores from multi-modal data. In: Proceedings of 21st international conference on information fusion, Cambridge, UKGoogle Scholar
  22. 22.
    Deb D, Ross A, Jain AK, Prakah-Asante K,Prasad KV (2019) Actions Speak Louder Than (Pass) words: Passive Authentication of Smartphone Users via Deep Temporal Features. In: Proceedings of the 12th IAPR International Conference on Biometrics, Crete, GreeceGoogle Scholar
  23. 23.
    Martinez-Diaz M, Fierrez J, Krish RP, Galbally J (2014) Mobile signature verification: feature robustness and performance comparison. IET Biometrics 3(4):267–277CrossRefGoogle Scholar
  24. 24.
    O’Neal M, Balagani K, Phoha V, Rosenberg A, Serwadda A, Karim ME (2016) Context-aware active authentication using touch gestures, typing patterns and body movement. Louisiana Tech University, RustonCrossRefGoogle Scholar
  25. 25.
    Morales JF, Tolosana R, Ortega-Garcia J, Galbally J, Gomez-Barrero M, Anjos A (2016) Keystroke biometrics ongoing competition. IEEE Access 4:7736–7746CrossRefGoogle Scholar
  26. 26.
    Perera P, Patel VM (2018) Efficient and low latency detection of intruders in mobile active authentication. IEEE Trans Inf Forensics Secur 13(6):1392–1405CrossRefGoogle Scholar
  27. 27.
    Ernst R (2019) Mobile phone afterlife – why the second-hand market will be all the rage in 2019. In RCR Wireless NewsGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Biometrics and Data Pattern Analytics (BiDA) Lab, EPS, Universidad Autonoma de MadridMadridSpain

Personalised recommendations