Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones

Accessing applications on mobile phones has become a habit of our daily activities. These applications either require a PIN (Personal Identification Number) / password for authentication or donot have any authentication measurement at all because of the priority from user friendliness. In order to enhance the security of these mobile applications while not much compromising the user friendliness, we develop an approach to authenticate the user by using WiFi and accelerometer data collected within 3 seconds when the user opens a mobile application. The proposed approach has been evaluated on a dataset collected from a real-life scenario in which the data was collected from the participants' own mobile phones, and the participants have the full right to decide where/when to open the application. According to the experimental results, the proposed score-level fusion approach achieved EER (Equal Error Rate) at 9.19%, which indicates the feasibility of deploying such authentication mechanism on the mobile application.

[1]  Clayton Shepard,et al.  Practical Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage , 2012, IEEE Transactions on Mobile Computing.

[2]  Anil K. Jain,et al.  Hacking Mobile Phones Using 2 D Printed Fingerprints , 2016 .

[3]  Rama Chellappa,et al.  Active user authentication for smartphones: A challenge data set and benchmark results , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[4]  Arun Ross,et al.  MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Maurizio Rebaudengo,et al.  On gait recognition with smartphone accelerometer , 2015, 2015 4th Mediterranean Conference on Embedded Computing (MECO).

[6]  Anil K. Jain,et al.  Gold Fingers: 3D Targets for Evaluating Capacitive Readers , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Geoffrey I. Webb,et al.  Encyclopedia of Machine Learning , 2011, Encyclopedia of Machine Learning.

[8]  Ge Peng,et al.  A multimodal data set for evaluating continuous authentication performance in smartphones , 2014, SenSys.

[9]  Ming Gao,et al.  Fingerprint sensors in mobile devices , 2014, 2014 9th IEEE Conference on Industrial Electronics and Applications.

[10]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[11]  P.Susan Lalitha Grace,et al.  Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location , 2017 .

[12]  Rahul Khanna,et al.  Machine Learning and Knowledge Discovery , 2015 .

[13]  Matjaz B. Juric,et al.  Inertial Sensor-Based Gait Recognition: A Review , 2015, Sensors.