A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users

With more advanced features loaded, smart phones nowadays are used not only for telecommunication but also for many emerging applications, such as m-banking. In this paper, we propose a novel non-intrusive authentication mechanism using the information collected from the orientation sensor of the smart phone. This new approach is based on the hypothesis that a user has a unique way to hold and operate his/her smart phone while working on some apps, and such behavioral biometrics can be captured from the readings of the orientation sensor. We design an authentication mechanism that adopts 53 new features transformed from those readings. To validate this hypothesis, we have developed an application to collect user's behavioral biometrics of up-down flicks and left-right flicks from the orientation sensor. The experimental results show that the proposed approach has an equal error rate about 6.85%. We find that the feature subset selected to build an authentication model with satisfactory performance is generally small, varying 3 to 8 for different users. We also find that the feature subsets are significantly different among different users. Finally, we show that the proposed non-intrusive mechanism can be used together with existing intrusive mechanisms, such as password and/or fingerprints, to build a more robust authentication framework for smart phone users.

[1]  Mohammad Najmud Doja,et al.  USER AUTHENTICATION SCHEMES FOR MOBILE AND HANDHELD DEVICES , 2008 .

[2]  Steven Furnell,et al.  Flexible and Transparent User Authentication for Mobile Devices , 2009, SEC.

[3]  Jouni Markkula,et al.  An integrated identity verification system for mobile terminals , 2005, Inf. Manag. Comput. Security.

[4]  Dexin Zhang,et al.  DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Heikki Ailisto,et al.  Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[6]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[7]  Jie Yang,et al.  Sweep fingerprint sequence reconstruction for portable devices , 2006 .

[8]  Berrin A. Yanikoglu,et al.  Identity authentication using improved online signature verification method , 2005, Pattern Recognit. Lett..

[9]  Douglas A. Reynolds,et al.  SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .

[10]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[11]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[12]  Patrick Bours,et al.  Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Kuanquan Wang,et al.  Palmprint Texture Analysis Using Derivative of Gaussian Filters , 2006, 2006 International Conference on Computational Intelligence and Security.

[14]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[15]  YanikogluBerrin,et al.  Identity authentication using improved online signature verification method , 2005 .

[16]  Kirsi Helkala,et al.  Biometric Gait Authentication Using Accelerometer Sensor , 2006, J. Comput..

[17]  R. Tibshirani,et al.  Improvements on Cross-Validation: The 632+ Bootstrap Method , 1997 .

[18]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[19]  Ahmed Awad E. Ahmed,et al.  A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.

[20]  Reto Meier Professional Android Application Development , 2008 .

[21]  Steven Furnell,et al.  Beyond the PIN: Enhancing user authentication for mobile devices , 2008 .

[22]  Jun Yang,et al.  SenGuard: Passive user identification on smartphones using multiple sensors , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[23]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Hamid Jahankhani,et al.  A Survey of User Authentication Based on Mouse Dynamics , 2008 .