When my Behavior Enhances my Smartphone Security

Smartphones have become ubiquitous in everyday life, storing and generating a huge amount of sensitive personal data which makes them vulnerable to increasing security and privacy threats. While protecting smartphones has become a necessity, existing traditional authentication methods, which are mainly based on the use of PIN codes and passwords, are facing remarkable drawbacks. Behavioural biometricsbased authentication is an interesting alternative to ensure a better protection and a better usability. This paper presents a transparent behavioural authentication solution using smartphone calling habits data. tested on a dataset of 93 users with more than 16.000 samples and shows promising results while guarantying a high privacy protection.

[1]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[3]  Mansour Alsaleh,et al.  Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods , 2017, PloS one.

[4]  Nathan L. Clarke Transparent User Authentication - Biometrics, RFID and Behavioural Profiling , 2011 .

[5]  Christophe Rosenberger,et al.  Privacy Preserving Transparent Mobile Authentication , 2017, ICISSP.

[6]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[7]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[8]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[9]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[10]  Christophe Rosenberger,et al.  An Overview on Privacy Preserving Biometrics , 2011 .

[11]  Gian Luca Foresti,et al.  Biometric Liveness Detection: Challenges and Research Opportunities , 2015, IEEE Security & Privacy.

[12]  W. Eric L. Grimson,et al.  Gait analysis for recognition and classification , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[13]  Mohammad Nauman,et al.  Using trusted computing for privacy preserving keystroke-based authentication in smartphones , 2013, Telecommun. Syst..