Model for adaptable context-based biometric authentication for mobile devices

It becomes possible to take advantage of seamless biometric authentication on mobile devices due to increasing quality and quantity of built-in sensors, increasing processing power of the devices, and wireless connectivity. However, practical effectiveness of the biometric authentication application depends on user’s environment conditions that can decrease the accuracy of biometrics recognition or make the acquisition process undesirable for mobile user in a given moment, i.e., effectiveness depends on usage context. In this paper, context-based biometric authentication model for mobile devices is proposed. It enables determining the most accurate authentication method at the moment along with the most accurate form of interacting with a user w.r.t. authentication process. The generic model designed and verified with proof-of-concept implementation constitutes a foundation for building further adaptable and extensible multi-factor context-dependent systems for mobile authentication.

[1]  Chuan Qin,et al.  Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.

[2]  Wolfgang Leister,et al.  A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth , 2014 .

[3]  R. Pearl Biometrics , 1914, The American Naturalist.

[4]  Anil K. Jain,et al.  Soft Biometric Traits for Continuous User Authentication , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Alan Goode Bring your own finger – how mobile is bringing biometrics to consumers , 2014 .

[6]  Ian Oakley,et al.  CASA: context-aware scalable authentication , 2013, SOUPS.

[7]  Gabriele Lenzini,et al.  Contextual Biometric-Based Authentication for Ubiquitous Services , 2010, UIC.

[8]  Stefan Poslad,et al.  An Evaluation Framework for Adaptive Security for the IoT in eHealth , 2014 .

[9]  Stan Sclaroff,et al.  Image-based Ear Biometric Smartphone App for Patient Identification in Field Settings , 2015, VISAPP.

[10]  Bachar El-Hassan,et al.  Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities , 2013, ICOST.

[11]  Mita Nasipuri,et al.  Thermal Infrared Face Recognition – A Biometric Identification Technique for Robust Security system , 2011 .

[12]  Tao Feng,et al.  Continuous mobile authentication using touchscreen gestures , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[13]  Christoph Busch,et al.  Context-Aware Mobile Biometric Authentication based on Support Vector Machines , 2013, 2013 Fourth International Conference on Emerging Security Technologies.

[14]  Andrea F. Abate,et al.  2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..

[15]  Ivan Poupyrev,et al.  Capacitive fingerprinting: exploring user differentiation by sensing electrical properties of the human body , 2012, UIST '12.

[16]  Jakob E. Bardram,et al.  Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing , 2003, UbiComp.

[17]  Sri Sairam A REVIEW ON CONTINUOUS AUTHENTICATION USING MULTIMODAL BIOMETRICS , 2013 .

[18]  Hemant Vallabh Authentication using finger-vein recognition , 2013 .

[19]  A REVIEW ON CONTINUOUS AUTHENTICATION USING MULTIMODAL BIOMETRICS , 2013 .

[20]  Asaf Varol,et al.  Android based mobile application development for web login authentication using fingerprint recognition feature , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).

[21]  Wolfgang Leister,et al.  An Evaluation Scenario for Adaptive Security in eHealth , 2013 .

[22]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.