ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones

被引:45
作者
Buriro, Attaullah [1 ,2 ]
Crispo, Bruno [1 ,3 ]
Conti, Mauro [4 ]
机构
[1] Univ Trento, Dept Informat Engn & Comp Sci DISI, Trento, Italy
[2] KFUEIT, Dept Informat Secur, Rahim Yar Khan, Pakistan
[3] KULeuven, Dept Comp Sci, Imec DistriNet, Leuven, Belgium
[4] Univ Padua, Dept Math, Padua, Italy
基金
欧盟地平线“2020”;
关键词
Smartphone; Sensors; Biometric authentication; Behavioral biometrics; Human-centered computing;
D O I
10.1016/j.jisa.2018.11.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a behavioral biometric-based smartphone user authentication mechanism, namely, AnswerAuth, which relies on the very common users' behavior. Behavior, here, refers to the way a user slides the lock button on the screen, to unlock the phone, and brings the phone towards her ear. The authentication mechanism works with the biometric behavior based on the extracted features from the data recorded using the built-in smartphone sensors, i.e., accelerometer, gyroscope, gravity, magnetometer and touchscreen, while the user performed sliding and phone-lifting actions. We tested AnswerAuth on a dataset of 10,200 behavioral patterns collected from 85 users while they performed the unlocking actions, in sitting, standing, and walking postures, using six state-of-the-art conceptually different machine learning classifiers in two settings, i.e., with and without simultaneous feature selection and classification. Among all the chosen classifiers, Random Forest (RF) classifier proved to be the most consistent and accurate classifier on both full and reduced features and provided a True Acceptance Rate (TAR) as high as 99.35%. We prototype proof-of-the-concept Android app, based on our findings, and evaluate it in terms of security and usability. Security analysis of AnswerAuth confirms its robustness against the possible mimicry attacks. Similarly, the usability study based on Software Usability Scale (SUS)(1) questionnaire verifies the user-friendliness of the proposed scheme (SUS Score of 75.11). Experimental results prove AnswerAuth as a secure and usable authentication mechanism. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:89 / 103
页数:15
相关论文
共 59 条
[1]  
Akhtar Z, 2017, IEEE GLOB CONF SIG, P1368, DOI 10.1109/GlobalSIP.2017.8309185
[2]   Acoustic ear recognition for person identification [J].
Akkermans, AHM ;
Kevenaar, TAM ;
Schobben, DWE .
FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, :219-223
[3]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[4]  
Anjum A, 2013, 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), P914, DOI 10.1109/CCNC.2013.6488584
[5]  
[Anonymous], 2013, INTRO STAT LEARNING
[6]  
[Anonymous], 2012, IFIP ADV INF COMMUN
[7]  
[Anonymous], 2016, Strategic Financial Management Casebook, DOI DOI 10.1109/CCIP.2016.7802880
[8]  
[Anonymous], 2012, TECHNICAL REPORT
[9]  
[Anonymous], 2017, THESIS
[10]  
Aviv AJ, 2009, P WOOT