A new mobile biometric based upon usage context

Securing mobile devices present unique challenges and there is considerable interest in identification of new biometric modalities for active authentication of mobile users. Naïve extension of desktop and other fixed asset biometric modalities to mobile environment is limiting because (a) mobile use provides a richer usage context including location and motion which should be exploited, and (b) biometrics like mouse and eye movement don't simply extend to the mobile usage. We present a new mobile biometric that combines behavioral elements corresponding to what, where, when, and how of the mobile device usage. We propose a representation scheme and a classification model for the new biometric. We also outline an active authentication framework and a test and evaluation approach for using the new biometric.

[1]  Margaret J. Robertson,et al.  Design and Analysis of Experiments , 2006, Handbook of statistics.

[2]  Eamonn O'Neill,et al.  Context Transitions: User Identification and Comparison of Mobile Device Motion Data , 2011, Activity Context Representation.

[3]  Simona Motogna,et al.  Motion-based Gesture Recognition with an Accelerometer , 2008 .

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  Pedro M. Domingos,et al.  On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.

[6]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[7]  Jin-Hyuk Hong,et al.  Understanding and prediction of mobile application usage for smart phones , 2012, UbiComp.

[8]  Jonghun Baek,et al.  Posture Monitoring System for Context Awareness in Mobile Computing , 2010, IEEE Transactions on Instrumentation and Measurement.

[9]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[10]  Clayton Shepard,et al.  Practical Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage , 2012, IEEE Transactions on Mobile Computing.

[11]  Pedro M. Domingos,et al.  Beyond Independence: Conditions for the Optimality of the Simple Bayesian Classifier , 1996, ICML.

[12]  Nuria Oliver,et al.  Towards a psychographic user model from mobile phone usage , 2011, CHI Extended Abstracts.

[13]  J. Berger Statistical Decision Theory and Bayesian Analysis , 1988 .

[14]  M. Mizianty,et al.  Comparative Analysis of the Impact of Discretization on the Classification with Naïve Bayes and Semi-Naïve Bayes Classifiers , 2008, 2008 Seventh International Conference on Machine Learning and Applications.

[15]  Ashwin Ashok,et al.  Demo: user identification and authentication with capacitive touch communication , 2012, MobiSys '12.

[16]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  D. Ruppert The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .

[18]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[19]  Dirk Van den Poel,et al.  Random Multiclass Classification: Generalizing Random Forests to Random MNL and Random NB , 2007, DEXA.

[20]  Gary M. Weiss,et al.  Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[21]  Huaiyu Zhu On Information and Sufficiency , 1997 .