Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression

People prefer to store important, private, and sensitive information on smartphones for convenient storage and fast access, such as photos and emails. To prevent information leakage and smartphone illegal access, we propose a novel sensor-based continuous authentication system, SensorCA, for continuously monitoring users’ behavior patterns, by leveraging the accelerometer, gyroscope, and magnetometer ubiquitously built-in smartphones. We are among the first to exploit the data augmentation approach of the rotation, which creates additional data by applying it on the collected raw data and improves the robustness of the proposed system. With the augmented data, SensorCA extracts sensor-based features in both time and frequency domains within a time window, then utilizes the kernel ridge regression with truncated Gaussian radial basis function kernel (KRR-TRBF) to train the classifier, and finally authenticates the current user as a legitimate user or an impostor. We evaluate the authentication performance of SensorCA in terms of different classifiers including KRR-TRBF, KRR-POLY, and SVM-RBF, and the data augmentation approach rotation on KRR-TRBF6 and SVM-RBF. The experimental results show that under the KRR-TRBF6 classifier, SensorCA reaches the lowest median equal error rate of 3.0% with dataset size 8000 and consumes the shortest training time of 0.054 seconds with dataset size 1000.

[1]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[2]  Yantao Li,et al.  Chaotic hash function based on circular shifts with variable parameters , 2016 .

[3]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[4]  A. Tikhonov On the stability of inverse problems , 1943 .

[5]  Christoph Busch,et al.  Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[6]  Shie Mannor,et al.  The kernel recursive least-squares algorithm , 2004, IEEE Transactions on Signal Processing.

[7]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[8]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[9]  Ying Zhang,et al.  n-Gram Geo-trace Modeling , 2011, Pervasive.

[10]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[11]  Sun-Yuan Kung,et al.  On efficient learning and classification kernel methods , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Ivan Martinovic,et al.  Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics , 2017, AsiaCCS.

[13]  Aad van Moorsel,et al.  Smartphone Continuous Authentication Using Deep Learning Autoencoders , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[14]  Xiaohui Xie,et al.  Co-Occurrence Feature Learning for Skeleton Based Action Recognition Using Regularized Deep LSTM Networks , 2016, AAAI.

[15]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[16]  Lei Yang,et al.  Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.

[17]  Matthias Trojahn,et al.  Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[18]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[19]  Xiao Wang,et al.  SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[20]  Guoliang Xue,et al.  Unobservable Re-authentication for Smartphones , 2013, NDSS.

[21]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Ruby B. Lee,et al.  Implicit Sensor-based Authentication of Smartphone Users with Smartwatch , 2016, HASP 2016.

[23]  Laurence T. Yang,et al.  Energy-Efficient Scheduling for Real-Time Systems Based on Deep Q-Learning Model , 2019, IEEE Transactions on Sustainable Computing.

[24]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[25]  Zhikui Chen,et al.  A Distributed Weighted Possibilistic c-Means Algorithm for Clustering Incomplete Big Sensor Data , 2014, Int. J. Distributed Sens. Networks.

[26]  Yufei Chen,et al.  Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.

[27]  Tae Hwan Oh,et al.  Analyzing User Awareness of Privacy Data Leak in Mobile Applications , 2015, Mob. Inf. Syst..

[28]  Laurence T. Yang,et al.  A survey on deep learning for big data , 2018, Inf. Fusion.

[29]  Rama Chellappa,et al.  Touch Gesture-Based Active User Authentication Using Dictionaries , 2015, 2015 IEEE Winter Conference on Applications of Computer Vision.

[30]  Rama Chellappa,et al.  Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.

[31]  Laurence T. Yang,et al.  Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning , 2018, IEEE Internet of Things Journal.

[32]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[33]  Kang G. Shin,et al.  Continuous Authentication for Voice Assistants , 2017, MobiCom.

[34]  David Kotz,et al.  ZEBRA: Zero-Effort Bilateral Recurring Authentication , 2014, IEEE Symposium on Security and Privacy.

[35]  Gang Zhou,et al.  Pedestrian walking safety system based on smartphone built-in sensors , 2018, IET Commun..

[36]  Ruby B. Lee,et al.  Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[37]  Sheikh Iqbal Ahamed,et al.  ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.

[38]  Susmita Sur-Kolay,et al.  CABA: Continuous Authentication Based on BioAura , 2017, IEEE Transactions on Computers.

[39]  Alexander J. Smola,et al.  Online learning with kernels , 2001, IEEE Transactions on Signal Processing.

[40]  Ruby B. Lee,et al.  Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).

[41]  Shuangquan Wang,et al.  Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glasses , 2017, IEEE Transactions on Human-Machine Systems.

[42]  Wenyao Xu,et al.  Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System , 2017, MobiCom.

[43]  Laurence T. Yang,et al.  PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing , 2017, IEEE Transactions on Big Data.

[44]  Robert F. Harrison,et al.  A kernel based adaline , 1999, ESANN.

[45]  Tsuyoshi Isshiki,et al.  Fingerprint authentication on touch sensor using Phase-Only Correlation method , 2016, 2016 7th International Conference of Information and Communication Technology for Embedded Systems (IC-ICTES).

[46]  Zhao Wang,et al.  Modeling interactive sensor-behavior with smartphones for implicit and active user authentication , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[47]  Ruby B. Lee,et al.  Sensor-Based Implicit Authentication of Smartphone Users , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[48]  J. Mercer Functions of positive and negative type, and their connection with the theory of integral equations , 1909 .