Learning-Aided User Identification Using Smartphone Sensors for Smart Homes

Smart homes expects to improve the convenience, comfort, and energy efficiency of the residents by connecting and controlling various appliances. As the personal information and computing hub for smart homes, smartphones allow people to monitor and control their homes anytime and anywhere. Therefore, the security and privacy of smartphones and the stored data are crucial in smart homes. To protect smartphones from potential attacks, various built-in sensors can be utilized for user authentication/identification and access control to achieve enhanced security. In this paper, we propose a framework, smartphone sensor user identification (SSUI), in order to facilitate user identification based on the relationships between different types of sensor data and smartphone users. Specifically in SSUI, the time and frequency features are extracted and learned separately using convolution neural network (CNN). The CNN outputs are then processed using recurrent neural network, according to several time bins. Using both of our own dataset (collected from 17 participants) and a publicly available dataset (i.e., Heterogeneity Dataset for Human Activity Recognition), we demonstrate the effectiveness of the proposed SSUI framework, where we achieve an accuracy rate of over 91.45% in various scenarios.

[1]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[2]  Luo Haiyong,et al.  An hidden Markov model based complex walking pattern recognition algorithm , 2016, 2016 Fourth International Conference on Ubiquitous Positioning, Indoor Navigation and Location Based Services (UPINLBS).

[3]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[4]  Fabio Roli,et al.  F-measure optimisation in multi-label classifiers , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[5]  Nitesh Saxena,et al.  Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture , 2013, CANS.

[6]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[7]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[8]  Noufal Kunnathu Biometric User Authentication on Smartphone Accelerometer Sensor Data , 2022 .

[9]  F. Girosi,et al.  Nonlinear prediction of chaotic time series using support vector machines , 1997, Neural Networks for Signal Processing VII. Proceedings of the 1997 IEEE Signal Processing Society Workshop.

[10]  Sen M. Kuo,et al.  Fast Fourier Transform and Its Applications , 2002 .

[11]  Lei Yang,et al.  Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.

[12]  Lin Zhong,et al.  User evaluation of lightweight user authentication with a single tri-axis accelerometer , 2009, Mobile HCI.

[13]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[14]  Dana Kulic,et al.  Exercise motion classification from large-scale wearable sensor data using convolutional neural networks , 2017, 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[15]  Xiang-Yang Li,et al.  SilentSense: silent user identification via touch and movement behavioral biometrics , 2013, MobiCom.

[16]  Shan Chang,et al.  ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.

[17]  Tom M Mitchell,et al.  Mining Our Reality , 2009, Science.

[18]  Martín Abadi,et al.  TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems , 2016, ArXiv.

[19]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[20]  Xiao Wang,et al.  SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[21]  Gary M. Weiss,et al.  Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[22]  Mikkel Baun Kjærgaard,et al.  Smart Devices are Different: Assessing and MitigatingMobile Sensing Heterogeneities for Activity Recognition , 2015, SenSys.

[23]  Jürgen Schmidhuber,et al.  A Clockwork RNN , 2014, ICML.

[24]  Ruby B. Lee,et al.  Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[25]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[26]  Hiroshi Inamura,et al.  Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket , 2016, MoMM.

[27]  Florian Alt,et al.  Improving Accuracy, Applicability and Usability of Keystroke Biometrics on Mobile Touchscreen Devices , 2015, CHI.

[28]  Yoshua Bengio,et al.  Deep Sparse Rectifier Neural Networks , 2011, AISTATS.

[29]  Charles C. Tappert,et al.  A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[30]  Cuong Pham,et al.  SigVer3D: Accelerometer Based Verification of 3-D Signatures on Mobile Devices , 2014, KSE.

[31]  Nitish Srivastava,et al.  Improving neural networks by preventing co-adaptation of feature detectors , 2012, ArXiv.

[32]  Prakash Ishwar,et al.  Two-Stream CNNs for Gesture-Based Verification and Identification: Learning User Style , 2016, CVPR 2016.

[33]  Ye Xu-zhen Fast Fourier transform and its applications , 2004 .