Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing

Smartphones are inescapable devices, which are becoming more and more intelligent and context-aware with emerging sensing, networking, and computing capabilities. They offer a captivating platform to the users for performing a wide variety of tasks including socializing, communication, sending or receiving emails, storing and accessing personal data etc. at anytime and anywhere. Nowadays, loads of people tend to store different types of private and sensitive data in their smartphones including bank account details, personal identifiers, accounts credentials, and credit card details. A lot of people keep their personal e-accounts logged in all the time in their mobile devices. Hence, these mobile devices are prone to different security and privacy threats and attacks from the attackers. Commonly used approaches for securing mobile devices such as passcode, PINs, pattern lock, face recognition, and fingerprint scan are vulnerable and exposed to several attacks including smudge attacks, side-channel attacks, and shoulder-surfing attacks. To address these challenges, a novel continuous authentication scheme is presented in this study, which recognizes smartphone users on the basis of their physical activity patterns using accelerometer, gyroscope, and magnetometer sensors of smartphone. A series of experiments are performed for user recognition using different machine learning classifiers, where six different activities are analyzed for multiple locations of smartphone on the user's body. SVM classifier achieved the best results for user recognition with an overall average accuracy of 97.95%. A comprehensive analysis of the user recognition results validates the efficiency of the proposed scheme. A novel authentication scheme is proposed for smartphone users, which is based on activity pattern recognition.Six activities of daily life are chosen to identify users based on their motion patterns using smartphone inertial sensors.The position sensitivity of inertial sensors is handled by placing smartphone at five different positions on the users body.DT, K-NN, and SVM classifiers are used for the purpose of user recognition, where SVM classifier provided the best results.

[1]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[2]  Bernt Schiele,et al.  A tutorial on human activity recognition using body-worn inertial sensors , 2014, CSUR.

[3]  Qing Yang,et al.  HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Davide Anguita,et al.  A Public Domain Dataset for Human Activity Recognition using Smartphones , 2013, ESANN.

[5]  Wenyao Xu,et al.  EyeVeri: A secure and usable approach for smartphone user authentication , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[6]  Deborah Estrin,et al.  PEIR, the personal environmental impact report, as a platform for participatory sensing systems research , 2009, MobiSys '09.

[7]  John Zimmerman,et al.  Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.

[8]  Paul J. M. Havinga,et al.  Complex Human Activity Recognition Using Smartphone and Wrist-Worn Motion Sensors , 2016, Sensors.

[9]  Reza Malekian,et al.  Physical Activity Recognition From Smartphone Accelerometer Data for User Context Awareness Sensing , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[10]  Duncan S. Wong,et al.  TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones , 2016, ACNS.

[11]  Hyunggon Park,et al.  ECG Authentication System Design Based on Signal Analysis in Mobile and Wearable Devices , 2016, IEEE Signal Processing Letters.

[12]  Bruno Crispo,et al.  Please hold on: Unobtrusive user authentication using smartphone's built-in sensors , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[13]  Tao Feng,et al.  Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Yong-Gyu Lee,et al.  Smartphone-based mobile health monitoring. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[15]  Shan Chang,et al.  ShakeIn: Secure User Authentication of Smartphones with Single-Handed Shakes , 2017, IEEE Transactions on Mobile Computing.

[16]  Toan Nguyen,et al.  IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid Images , 2017, IEEE Transactions on Information Forensics and Security.

[17]  Yunhao Liu,et al.  Sherlock: Micro-Environment Sensing for Smartphones , 2014, IEEE Transactions on Parallel and Distributed Systems.

[18]  Ron Kohavi,et al.  Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.

[19]  Yunze Zeng Activity-based implicit authentication for wearable devices: Ph.D. forum abstract , 2016, IPSN 2016.

[20]  Maayan Zhitomirsky-Geffet,et al.  Cross-generational analysis of predictive factors of addictive behavior in smartphone usage , 2016, Comput. Hum. Behav..

[21]  Paul J. M. Havinga,et al.  Activity Recognition Using Inertial Sensing for Healthcare, Wellbeing and Sports Applications: A Survey , 2010, ARCS Workshops.

[22]  Matthias Trojahn,et al.  Toward Mobile Authentication with Keystroke Dynamics on Mobile Phones and Tablets , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[23]  Zhigang Liu,et al.  Darwin phones: the evolution of sensing and inference on mobile phones , 2010, MobiSys '10.

[24]  Alex X. Liu,et al.  Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it , 2013, MobiCom.

[25]  Jiang Zhu,et al.  KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.

[26]  Piet Kommers,et al.  Modeling habitual and addictive smartphone behavior: The role of smartphone usage types, emotional intelligence, social stress, self-regulation, age, and gender , 2015, Comput. Hum. Behav..

[27]  Wei-Yin Loh,et al.  Classification and regression trees , 2011, WIREs Data Mining Knowl. Discov..

[28]  Abayomi Moradeyo Otebolaku,et al.  User context recognition using smartphone sensors and classification models , 2016, J. Netw. Comput. Appl..

[29]  Gert R. G. Lanckriet,et al.  Physical activity recognition in free-living from body-worn sensors , 2013, SenseCam '13.

[30]  Rytis Maskeliunas,et al.  Smartphone User Identity Verification Using Gait Characteristics , 2016, Symmetry.

[31]  Hanghang Tong,et al.  Activity recognition with smartphone sensors , 2014 .

[32]  Rahim Tafazolli,et al.  A survey on smartphone-based systems for opportunistic user context recognition , 2013, CSUR.

[33]  Gary M. Weiss,et al.  Applications of mobile activity recognition , 2012, UbiComp.

[34]  Paul J. M. Havinga,et al.  Fusion of Smartphone Motion Sensors for Physical Activity Recognition , 2014, Sensors.

[35]  Rui Wang,et al.  Using Smartphones to Collect Behavioral Data in Psychological Science , 2016, Perspectives on psychological science : a journal of the Association for Psychological Science.

[36]  Alex Fridman,et al.  Learning Human Identity from Motion Patterns , 2015, IEEE Access.

[37]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[38]  Zhaohui Wu,et al.  Accelerometer-Based Gait Recognition by Sparse Representation of Signature Points With Clusters , 2015, IEEE Transactions on Cybernetics.

[39]  Rubén San-Segundo-Hernández,et al.  Frequency features and GMM-UBM approach for gait-based person identification using smartphone inertial signals , 2016, Pattern Recognit. Lett..

[40]  Wazir Zada Khan,et al.  Mobile Phone Sensing Systems: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[41]  Liam M. Mayron Biometric Authentication on Mobile Devices , 2015, IEEE Security & Privacy.

[42]  Demetrios Zeinalipour-Yazti,et al.  Crowdsourcing with Smartphones , 2012, IEEE Internet Computing.

[43]  Hai Huang,et al.  You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[44]  Paul J. M. Havinga,et al.  Towards Physical Activity Recognition Using Smartphone Sensors , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[45]  Farah Ahmad,et al.  Participant experiences in a smartphone-based health coaching intervention for type 2 diabetes: A qualitative inquiry , 2016, Journal of telemedicine and telecare.

[46]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[47]  Paul J. M. Havinga,et al.  A Survey of Online Activity Recognition Using Mobile Phones , 2015, Sensors.

[48]  Robert Meersman,et al.  On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE , 2003, Lecture Notes in Computer Science.

[49]  Thomas W Valente,et al.  Social network diagnostics: a tool for monitoring group interventions , 2013, Implementation Science.

[50]  Atsushi Kanai,et al.  Personal authentication method against shoulder-surfing attacks for smartphone , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).

[51]  A M KommersPiet,et al.  Modeling habitual and addictive smartphone behavior , 2015 .

[52]  Jain-Shing Wu,et al.  Smartphone continuous authentication based on keystroke and gesture profiling , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[53]  Muhammad Usman Ilyas,et al.  Activity recognition using smartphone sensors , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[54]  Yuwei Chen,et al.  Human Behavior Cognition Using Smartphone Sensors , 2013, Sensors.

[55]  Cem Ersoy,et al.  A Review and Taxonomy of Activity Recognition on Mobile Phones , 2013 .

[56]  Kyung-Seu Cho,et al.  Influence of smartphone addiction proneness of young children on problematic behaviors and emotional intelligence: Mediating self-assessment effects of parents using smartphones , 2017, Comput. Hum. Behav..

[57]  Juan E. Tapiador,et al.  Human Identification Using Compressed ECG Signals , 2015, Journal of Medical Systems.

[58]  Yunze Zeng Ph.D. Forum Abstract: Activity-Based Implicit Authentication for Wearable Devices , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[59]  Konrad Paul Kording,et al.  Using Mobile Phones for Activity Recognition in Parkinson’s Patients , 2012, Front. Neur..

[60]  Miguel A. Labrador,et al.  A Survey on Human Activity Recognition using Wearable Sensors , 2013, IEEE Communications Surveys & Tutorials.

[61]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[62]  David W. McDonald,et al.  Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.

[63]  Alessio Vecchio,et al.  Gait-based authentication using a wrist-worn device , 2016, MobiQuitous.

[64]  Nitesh Saxena,et al.  Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture , 2013, CANS.

[65]  Leif E. Peterson K-nearest neighbor , 2009, Scholarpedia.

[66]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[67]  Rebecca A. O'Leary,et al.  Classification and Regression Tree and Spatial Analyses Reveal Geographic Heterogeneity in Genome Wide Linkage Study of Indian Visceral Leishmaniasis , 2010, PloS one.

[68]  Heikki Ailisto,et al.  Identifying users of portable devices from gait pattern with accelerometers , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[69]  Syed Abdul Rahman Al-Haddad,et al.  ECG biometric authentication based on non-fiducial approach using kernel methods , 2016, Digit. Signal Process..

[70]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[71]  Wenbing Zhao,et al.  SPE: Security and Privacy Enhancement Framework for Mobile Devices , 2017, IEEE Transactions on Dependable and Secure Computing.

[72]  Judith Liu-Jimenez,et al.  Gait recognition using smartphone , 2016, 2016 IEEE International Carnahan Conference on Security Technology (ICCST).

[73]  Lei Yang,et al.  Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.

[74]  Xiaohong Guan,et al.  Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones , 2016, Sensors.

[75]  Paul J. M. Havinga,et al.  Towards detection of bad habits by fusing smartphone and smartwatch sensors , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).