An Authentication Technique: Behavioral Data Profiling on Smart Phones

Mobile devices have become an indispensable component in modern society. Many of these devices rely on personal identification numbers (PIN) as a form of user authentication. One of the main concerns in the use of mobile devices is the possibility of a breach in security and privacy if the device is seized by an outside party. Threats can possibly come from friends as well as strangers. Smart devices can be easily lost due to their small size, thereby exposing details of users’ private lives. User behavior authentication is designed to overcome this problem by utilizing user behavioral techniques to continuously assess user identity. This study proposed a behavioral data profiling technique that utilizes data collected from the user behavior application to verify the identity of the user in a continuous manner. By utilizing a combination of analytical hierarchy process and correlation coefficient method, the best experimental results were obtained by verifying the identity of six types of user behaviors to determine the different behaviors. Based on the results, this study proposes a new authentication technique that enables verification of a user’s identity through their application usage in a transparent manner. Behavioral data profiling is designed in a modular manner that will not reject user access based on a single application activity but on several consecutive abnormal application usages to balance the trade-off between security and usability. The proposed framework is evaluated using a PIN-based technique and achieved an overall 95% confidence level. Behavioral data profiling provides a significant improvement in the security afforded to the device and user convenience.