2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017
DOI: 10.1109/dsn.2017.24
|View full text |Cite
|
Sign up to set email alerts
|

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Abstract: Abstract-Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access securitycritical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
66
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(69 citation statements)
references
References 29 publications
(46 reference statements)
2
66
0
Order By: Relevance
“…Modern mobile devices provide a rich set of sources for extracting user behavioral data. The ubiquitous touchscreen and a variety of sensors such as audio sensors, light sensors, accelerometers, gyroscope, and magnetometers can be leveraged for capturing user behavior data [47,10,46,14,15,54,55,26,34,41,35]. Most of such work, however, has focused on user authentication as described below.…”
Section: Related Workmentioning
confidence: 99%
“…Modern mobile devices provide a rich set of sources for extracting user behavioral data. The ubiquitous touchscreen and a variety of sensors such as audio sensors, light sensors, accelerometers, gyroscope, and magnetometers can be leveraged for capturing user behavior data [47,10,46,14,15,54,55,26,34,41,35]. Most of such work, however, has focused on user authentication as described below.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of the sensorial data at stake, it is remarkable that almost all precedent works [ 9 , 10 , 11 , 12 , 31 , 32 , 33 , 34 , 35 ] rely upon some external element such as GPS satellites or telephony cell towers. This issue is relevant as the absence of these elements would make their approach to be affected.…”
Section: Related Workmentioning
confidence: 99%
“…Although these two commonly used methods (knowledge-based authentication and static biometric-based authentication) have been in full swing for decades, there are a series of deficiencies in usability, security, and effectiveness. Therefore, in recent years, using motion sensors such as acceleration sensors, gyro sensors, and gravity sensors as data sources, a method of authentication based on the user’s dynamic behavior, has been proposed by many researchers (e.g., gait authentication [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 ], user’s usage behavior authentication [ 32 , 33 , 34 , 35 , 36 , 37 , 38 ], and daily life behavior authentication [ 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 ]). These methods have better user experience and stronger privacy protection capabilities, laying the foundation for the development of the third phase of mobile user authentication.…”
Section: Introductionmentioning
confidence: 99%