Abstract
Smart Offices promise the improvement of working conditions in terms of efficiency, productivity and facility. However, new cybersecurity challenges arise associated with the new capabilities of Smart Cities. One of the key challenges is the utilisation of continuous and non-invasive authentication mechanisms since traditional authentication methods have important limitations. Thus, to cover these limitations, the main contribution of this paper is the design and deployment of a continuous and intelligent authentication architecture oriented to Smart Offices. The architecture is oriented to the cloud computing paradigm and considers Machine Learning techniques to authenticate users according to their behaviours. Some experiments demonstrated the suitability of the proposed solution when recognising and authenticating different users using a classification algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Suzuki, L.R.: Smart cities IoT: enablers and technology road map. In: Rassia, S.T., Pardalos, P.M. (eds.) Smart City Networks. SOIA, vol. 125, pp. 167–190. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61313-0_10
Almalki, S., Chatterjee, P., Roy, K.: Continuous authentication using mouse clickstream data analysis. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 76–85. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_6
Fridman, L., et al.: Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41, 142–156 (2015)
Montgomery, M., Chatterjee, P., Jenkins, J., Roy, K.: Touch analysis: an empirical evaluation of machine learning classification algorithms on touch data. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 147–156. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_12
Jorquera Valero, J.M., et al.: Improving the security and QoE in mobile devices through an intelligent and adaptive continuous authentication system. Sensors 18, 3769 (2018)
Bo, C., Zhang, L., Li, X.: SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics. CoRR, pp. 187–190 (2013)
Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33, 49–61 (2016)
Ehatisham-ul Haq, M., et al.: Authentication of smartphone users based on activity recognition and mobile sensing. Sensors 17, 2043 (2017)
Deutschmann, I., Lindholm, J.: Behavioral biometrics for DARPA’s active authentication program. In: International Conference of the BIOSIG Special Interest Group (BIOSIG). Darmstadt, vol. 2013, pp. 1–8 (2013)
Aljohani, O., Aljohani, N., Bours, P., Alsolami, F.: Continuous authentication on PCs using artificial immune system. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). https://doi.org/10.1109/cais.2018.8442022
Dasgupta, D.: An Overview of Artificial Immune Systems and Their Applications. Springer, Heidelberg (1999). https://doi.org/10.1007/978-3-642-59901-9
Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1–22 (2017). https://doi.org/10.1016/j.neucom.2016.11.031. ISSN 0925–2312
Ashibani, Y., Kauling, D., Mahmoud, Q.H.: Design and implementation of a contextual-based continuous authentication framework for smart homes. Appl. Syst. Innov. 2, 4 (2019)
Nespoli, P., et al.: PALOT: profiling and authenticating users leveraging internet of things. Sensors 19, 2832 (2019)
Operating System Market Share. Stat Counter. http://gs.statcounter.com/os-market-share/. Accessed 23 June 2019
Python to exe, Python Library. http://www.py2exe.org/. Accessed 22 June 2019
pynput, Python Library. https://pypi.org/project/pynput/. Accessed 22 June 2019
psutil, Python Library. https://pypi.org/project/psutil/. Accessed 22 June 2019
pywin32, Python Library. https://pypi.org/project/pywin32/. Accessed 22 June 2019
Android Developers, Android Library. https://developer.android.com. Accessed 26 June 2019
Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning - ICML 2006. https://doi.org/10.1145/1143844.1143865
Scikit-learn: Machine Learning in Python, Python Library. https://scikit-learn.org/stable/. Accessed 19 June 2019
Python Data Analysis Library, Python Library. https://pandas.pydata.org/. Accessed 23 June 2019
Acknowledgment
This work has been partially supported by the Irish Research Council, under the government of Ireland post-doc fellowship (grant code GOIPD/2018/466). Special thanks to all those voluntaries who installed the client applications: Oscar Fernández, Pedro A. Sánchez, Francisco J. Sánchez, Pantaleone Nespoli, Mattia Zago, Sergio López, Manuel Gil, José M. Jorquera and Gregorio Martínez.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sánchez Sánchez, P.M., Huertas Celdrán, A., Fernández Maimó, L., Martínez Pérez, G., Wang, G. (2019). Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-1301-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1300-8
Online ISBN: 978-981-15-1301-5
eBook Packages: Computer ScienceComputer Science (R0)