Your Moves, Your Device: Establishing Behavior Profiles Using Tensors

Smartphones became a person’s constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor authentication or personal assistants. In addition, Internet of Things (IoT) gadgets extend the capabilities of the latter even further. Devices such as body worn fitness trackers allow users to keep track of daily activities by periodically synchronizing data with the smartphone and ultimately with the vendor’s computational centers in the cloud. These fitness trackers are equipped with an array of sensors to measure the movements of the device, to derive information as step counts or make assessments about sleep quality. We capture the raw sensor data from wrist-worn activity trackers to model a biometric behavior profile of the carrier. We establish and present techniques to determine rather the original person, who trained the model, is currently wearing the bracelet or another individual. Our contribution is based on CANDECOMP/PARAFAC (CP) tensor decomposition so that computational complexity facilitates: the execution on light computational devices on low precision settings, or the migration to stronger CPUs or to the cloud, for high to very high granularity. This precision parameter allows the security layer to be adaptable, in order to be compliant with the requirements set by the use cases. We show that our approach identifies users with high confidence.

[1]  Marlies Rybnicek,et al.  A roadmap to continuous biometric authentication on mobile devices , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  R. A. Leibler,et al.  On Information and Sufficiency , 1951 .

[3]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[4]  Jon Louis Bentley,et al.  Multidimensional binary search trees used for associative searching , 1975, CACM.

[5]  H. Sebastian Seung,et al.  Learning the parts of objects by non-negative matrix factorization , 1999, Nature.

[6]  Max Welling,et al.  Positive tensor factorization , 2001, Pattern Recognit. Lett..

[7]  Roberto Di Pietro,et al.  A two-factor mobile authentication scheme for secure financial transactions , 2005, International Conference on Mobile Business (ICMB'05).

[8]  James M. Keller,et al.  A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[9]  J. Chang,et al.  Analysis of individual differences in multidimensional scaling via an n-way generalization of “Eckart-Young” decomposition , 1970 .

[10]  Bülent Yener,et al.  Modeling and Multiway Analysis of Chatroom Tensors , 2005, ISI.

[11]  L. Tucker,et al.  Some mathematical notes on three-mode factor analysis , 1966, Psychometrika.

[12]  Wenyao Xu,et al.  EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[13]  Adrian Burns,et al.  SHIMMER™ – A Wireless Sensor Platform for Noninvasive Biomedical Research , 2010, IEEE Sensors Journal.

[14]  Péter Várlaki,et al.  Image Processing on Tensor-Product Basis , 2011 .

[15]  Arun Ross,et al.  MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Gustavo E. A. P. A. Batista,et al.  Speeding Up All-Pairwise Dynamic Time Warping Matrix Calculation , 2016, SDM.

[17]  Christos Faloutsos,et al.  Location based Social Network analysis using Tensors and Signal Processing tools , 2015, 2015 IEEE 6th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[18]  Tamara G. Kolda,et al.  Tensor Decompositions and Applications , 2009, SIAM Rev..

[19]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[20]  Qun Li,et al.  GlassGesture: Exploring head gesture interface of smart glasses , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  Amro Louay Al-Bajjari,et al.  Optimized Authentication Scheme for Web Application , 2016, 2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA).

[22]  Evangelos Kalogerakis,et al.  RisQ: recognizing smoking gestures with inertial sensors on a wristband , 2014, MobiSys.

[23]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[24]  Jwu-Sheng Hu,et al.  A Robust Orientation Estimation Algorithm Using MARG Sensors , 2015, IEEE Transactions on Instrumentation and Measurement.

[25]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[26]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[27]  Shan Chang,et al.  ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.

[28]  Hayder Radha,et al.  Compression of image ensembles using tensor decomposition , 2013, 2013 Picture Coding Symposium (PCS).

[29]  Richard A. Harshman,et al.  Foundations of the PARAFAC procedure: Models and conditions for an "explanatory" multi-model factor analysis , 1970 .