skip to main content
10.1145/3393527.3393554acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

A Novel Smartphone Identity Authentication Mechanism

Published:26 October 2020Publication History

ABSTRACT

Identity authentication plays an important role in maintaining social security. With the rapid growth of population, an important issue is put in front of people. How to identify people more accurately and faster? This paper presents a novel behavioral biometric authentication mechanism for smartphones, named PickupAuth. PickupAuth relies on a combined movement, which is the user picks up the phone to his chest and clicks on the touch screen. PickupAuth uses the built-in smartphone sensors to collect the force of the click screen, the acceleration data, the magnetic field data, and the rotation rate. A new proposed feature subset selection algorithm based on the correlation and weight values and Random Forest classification algorithm are used to analyze the sensor data. Experiments on 110 identity users show that the accuracy reaches 98.44% in sitting posture and 97.46% in standing posture. Besides, PickupAuth is more efficient than state of the art considering the training data acquisition time and the training time.

References

  1. The World Bank. [n.d.]. Population, total. https://data.worldbank.org/indicator/SP.POP.TOTL.Google ScholarGoogle Scholar
  2. Attaullah Buriro, Bruno Crispo, and Mauro Conti. 2019. AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones. Journal of Information Security and Applications 44 (2019), 89 - 103. https://doi.org/10.1016/j.jisa.2018.11.008Google ScholarGoogle ScholarCross RefCross Ref
  3. A. Buriro, B. Crispo, F. Delfrari, and K. Wrona. 2016. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. In 2016 IEEE Security and Privacy Workshops (SPW). 276--285. https://doi.org/10.1109/SPW.2016.20Google ScholarGoogle Scholar
  4. A. Buriro, B. Crispo, and Y. Zhauniarovich. 2017. Please hold on: Unobtrusive user authentication using smartphone's built-in sensors. In 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). 1--8. https://doi.org/10.1109/ISBA.2017.7947684Google ScholarGoogle ScholarCross RefCross Ref
  5. H. Choi, B. Lee, and S. Yoon. 2016. Biometric Authentication Using Noisy Electrocardiograms Acquired by Mobile Sensors. IEEE Access 4 (2016), 1266--1273. https://doi.org/10.1109/ACCESS.2016.2548519Google ScholarGoogle ScholarCross RefCross Ref
  6. Mark A. Hall. 2000. Correlation-based Feature Selection for Discrete and Numeric Class Machine Learning. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML '00). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 359--366. http://dl.acm.org/citation.cfm?id=645529.657793Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Feng Hong, Meiyu Wei, Shujuan You, Yuan Feng, and Zhongwen Guo. 2015. Waving Authentication: Your Smartphone Authenticate You on Motion Gesture. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI EA '15). ACM, New York, NY, USA, 263--266. https://doi.org/10.1145/2702613.2725444Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, and Ruby Lee. 2017. Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. 67--78. https://doi.org/10.1145/3078861.3078870Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Li, X. Zhao, and G. Xue. 2013. Unobservable Re-authentication for Smartphones. Ndss (2013).Google ScholarGoogle Scholar
  10. V. Matyas and Z. Riha. 2003. Toward reliable user authentication through biometrics. IEEE Security Privacy 1, 3 (May 2003), 45--49. https://doi.org/10.1109/MSECP.2003.1203221Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shahla Nemati and Mohammad Ehsan Basiri. 2011. Text-independent speaker verification using ant colony optimization-based selected features. Expert Systems with Applications 38, 1 (2011), 620 - 630. https://doi.org/10.1016/j.eswa.2010.07.011Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paulo Henrique Pisani, Romain Giot, André C.P.L.F. de Carvalho, and Ana Carolina Lorena. 2016. Enhanced template update: Application to keystroke dynamics. Computers & Security 60 (2016), 134 - 153. https://doi.org/10.1016/j.cose.2016.04.004Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Shen, Y. Zhang, X. Guan, and R. A. Maxion. 2016. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication. IEEE Transactions on Information Forensics and Security 11, 3 (March 2016), 498--513. https://doi.org/10.1109/TIFS.2015.2503258Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tanmay Tulsidas Verlekar, Luís Ducla Soares, and Paulo Lobato Correia. 2018. Gait recognition in the wild using shadow silhouettes. Image and Vision Computing 76 (2018), 1 - 13. https://doi.org/10.1016/j.imavis.2018.05.002Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Novel Smartphone Identity Authentication Mechanism

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACM TURC '20: Proceedings of the ACM Turing Celebration Conference - China
      May 2020
      220 pages
      ISBN:9781450375344
      DOI:10.1145/3393527

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader