Skip to main content

An Authentication Technique: Behavioral Data Profiling on Smart Phones

  • Conference paper
  • First Online:
  • 1003 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 488))

Abstract

Mobile devices have become an indispensable component in modern society. Many of these devices rely on personal identification numbers (PIN) as a form of user authentication. One of the main concerns in the use of mobile devices is the possibility of a breach in security and privacy if the device is seized by an outside party. Threats can possibly come from friends as well as strangers. Smart devices can be easily lost due to their small size, thereby exposing details of users’ private lives. User behavior authentication is designed to overcome this problem by utilizing user behavioral techniques to continuously assess user identity. This study proposed a behavioral data profiling technique that utilizes data collected from the user behavior application to verify the identity of the user in a continuous manner. By utilizing a combination of analytical hierarchy process and correlation coefficient method, the best experimental results were obtained by verifying the identity of six types of user behaviors to determine the different behaviors. Based on the results, this study proposes a new authentication technique that enables verification of a user’s identity through their application usage in a transparent manner. Behavioral data profiling is designed in a modular manner that will not reject user access based on a single application activity but on several consecutive abnormal application usages to balance the trade-off between security and usability. The proposed framework is evaluated using a PIN-based technique and achieved an overall 95% confidence level. Behavioral data profiling provides a significant improvement in the security afforded to the device and user convenience.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Guo, C., Wang, H.J., Zhu, W., et al.: Smart-phone attacks and defenses. In: hotnets III, San Diego, CA (2004)

    Google Scholar 

  2. Leavitt, N.: Malicious code moves to mobile devices. IEEE Comput. 33(12), 16–19 (2000)

    Article  Google Scholar 

  3. Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Comput. 3(4), 11–15 (2004)

    Article  Google Scholar 

  4. Li, Q., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)

    Article  Google Scholar 

  5. La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446–471 (2013)

    Article  Google Scholar 

  6. Draffin, B., Zhu, J., Zhang, J.: Keysens: passive user authentication through micro-behavior modeling of soft keyboard interaction. In: International Conference on Mobile Computing, Applications, and Services, pp. 184–201. Springer (2013)

    Google Scholar 

  7. Saaty, T.L., Vargas, L.G.: Hierarchical analysis of behavior in competition: prediction in chess. Syst. Res. Behav. Sci. 25(3), 180–191 (1980)

    Article  Google Scholar 

  8. Saaty, T.L.: The analytic hierarchy and analytic network processes for the measurement of intangible criteria and for decision-making. In: Multiple Criteria Decision Analysis: State of the Art Surveys, pp. 345–405 (2005)

    Google Scholar 

  9. Clarke, N., Karatzouni, S., Furnell, S.: Flexible and transparent user authentication for mobile devices. In: IFIP International Information Security Conference, pp. 1–12. Springer (2009)

    Google Scholar 

Download references

Acknowledgment

This work is funded by a research grant under the title ‘Research on Big Data in Heterogeneous Fixed Wireless Network (304/PKOMP/650804/M151).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salmah Mousbah Zeed Mohammed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohammed, S.M.Z., Shariff, A.R.M., Singh, M.M. (2018). An Authentication Technique: Behavioral Data Profiling on Smart Phones. In: Alfred, R., Iida, H., Ag. Ibrahim, A., Lim, Y. (eds) Computational Science and Technology. ICCST 2017. Lecture Notes in Electrical Engineering, vol 488. Springer, Singapore. https://doi.org/10.1007/978-981-10-8276-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8276-4_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8275-7

  • Online ISBN: 978-981-10-8276-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics