Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System

被引:14
|
作者
Jorquera Valero, Jose Maria [1 ]
Sanchez Sanchez, Pedro Miguel [1 ]
Fernandez Maimo, Lorenzo [2 ]
Huertas Celdran, Alberto [3 ]
Arjona Fernandez, Marcos [4 ]
De Los Santos Vilchez, Sergio [4 ]
Martinez Perez, Gregorio [1 ]
机构
[1] Univ Murcia, Dept Informat & Commun Engn DIIC, E-30100 Murcia, Spain
[2] Univ Murcia, Dept Comp Engn DITEC, E-30100 Murcia, Spain
[3] Waterford Inst Technol Co, Telecommun Software & Syst Grp, Waterford X91 K0EK, Ireland
[4] ElevenPaths, Innovat & Labs, Cybersecur Unit Telefon Digital Espana, Malaga 29071, Spain
关键词
cybersecurity; continuous authentication; adaptability; sensors; applications; mobile devices; machine learning; anomaly detection;
D O I
10.3390/s18113769
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Continuous authentication systems for mobile devices focus on identifying users according to their behaviour patterns when they interact with mobile devices. Among the benefits provided by these systems, we highlight the enhancement of the system security, having permanently authenticated the users; and the improvement of the users' quality of experience, minimising the use of authentication credentials. Despite the benefits of these systems, they also have open challenges such as the authentication accuracy and the adaptability to new users' behaviours. Continuous authentication systems should manage these challenges without forgetting critical aspects of mobile devices such as battery consumption, computational limitations and response time. With the goal of improving these previous challenges, the main contribution of this paper is the design and implementation of an intelligent and adaptive continuous authentication system for mobile devices. The proposed system enables the real-time users' authentication by considering statistical information from applications, sensors and Machine Learning techniques based on anomaly detection. Several experiments demonstrated the accuracy, adaptability, and resources consumption of our solution. Finally, its utility is validated through the design and implementation of an online bank application as proof of concept, which allows users to perform different actions according to their authentication level.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Continuous Authentication and Identification for Mobile Devices: Combining Security and Forensics
    Mondal, Soumik
    Bours, Patrick
    2015 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2015,
  • [2] Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System
    Yao, Feng
    Yerima, Suleiman Y.
    Kang, BooJoong
    Sezer, Sakir
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [3] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [4] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95
  • [5] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [6] Who wants Continuous Authentication on Mobile Devices?
    Rasnayaka, Sanka
    Sim, Terence
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [7] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [8] A Roadmap to Continuous Biometric Authentication on Mobile Devices
    Rybnicek, Marlies
    Lang-Muhr, Christoph
    Haslinger, Daniel
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 122 - 127
  • [9] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [10] Mobile Intelligent Network security with SIP Authentication Procedure
    Abdallah, Handoura
    Daniel, Bourget
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2638 - 2643