| Literature DB >> 28878177 |
Muhammad Ehatisham-Ul-Haq1, Muhammad Awais Azam2, Jonathan Loo3, Kai Shuang4, Syed Islam5, Usman Naeem6, Yasar Amin7.
Abstract
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.Entities:
Keywords: activity recognition; behavioral biometrics; continuous sensing; micro-environment sensing; mobile sensing; smartphone authentication; ubiquitous computing
Mesh:
Year: 2017 PMID: 28878177 PMCID: PMC5620999 DOI: 10.3390/s17092043
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Smartphone inertial sensors are sensitive to the orientation of the smartphone. The accelerometer measures acceleration, the gyroscope measures rotation, and the magnetometer measures the magnetic field strength along the x, y, and z axes.
A comparison of different studies of behavioral authentication of smartphone users.
| Study | Behavioral Biometrics Approach | Classifier | Feature Set |
|---|---|---|---|
| Yang et al. [ | Hand waving using linear accelerometer | - | Sampling interval, acceleration along |
| Shrestha et al. [ | Hand wavingusing ambient light sensor | SVM [ | Timestamps, light intensity, hand wave gesture duration |
| Draffin et al. [ | Keystroke biometrics | Neural Network Classifier [ | Location pressed on key, length of press, size of touched area, drift |
| Feng et al. [ | Keystroke biometrics | Decision Tree [ | - |
| Frank et al. [ | Touchscreen interactions | SVM [ | - |
| Shahzad et al. [ | Touchscreen interactions | - | - |
| Derawi et al. [ | Gait biometrics using smartphone sensors | DTW [ | Time interpolation, Average cycle length |
| Mantyjarvi et al. [ | Gait biometrics using accelerometer | - | Acceleration along |
| Clarke and Mekala et al. [ | Dynamic signatures by typing words | - | - |
| Sae-Bae [ | Line signature drawn with fingertip | DTW [ | - |
| Kunz et al. [ | Speaker verification during ongoing phone call | HMMs [ | - |
| Das et al. [ | Speaker’s identification based on speech dynamics | DTW [ | - |
| Kambourakis et al. [ | Behavioral profiling | MLP [ | Hold time, inter-time, speed, distance |
Limitations of behavioral biometric approaches for smartphone user authentication.
| Behavioral Biometric Approach | Limitations |
|---|---|
| Hand waving Patterns and Gestures | Requires a user to interact with the device actively and make a specific hand waving gesture for authentication User may generate some random hand waving gestures un-intentionally Validates a user only when a hand waving gesture is made Failure in identifying an impostor who accesses the phone while it is unlocked Multiple users may have the same hand waving patterns |
| Keystroke Dynamics | Requires active interaction of the user with the device keyboard for authentication Validates a user only when something is typed using the device keyboard Learning the keystroke patterns for a new user takes a lot of time Person’s typing behavior changes considerably throughout a day with different states of mind such as excited, tired, etc. Switching keyboards may change the typing patterns Disruptions during typing may significantly influence the typing patterns |
| Touchscreen Interactions | Requires active interaction of the user with the touchscreen for authentication Holding a smartphone in hands with different orientations vary the way of the user’s interactions with the touchscreen User’s activity while interacting with touchscreen, such as walking, sitting, standing etc., effects the way of touching the device screen |
| Handwriting and Signatures | Requires a user to interact with the device actively to input signatures Only feasible for entry point authentication People may not sign in a steady way all the times |
| Voice | Unwanted noises in the user’s surroundings, such as traffic noise, noise of a crowd of people talking etc., greatly affect the recognition and identification of the user’s voice |
| Gait Patterns | Wearing an outfit, such as a trench coat or a footwear, may change a person’s walking style Dependency of gait patterns on the position of motion sensors on the human body |
| Behavioral Profiling | User’s behavioral patterns change with the user’s mood and state of mind while interacting with different services and applications using touchscreen and keystroke |
Figure 2Proposed methodology for smartphone user authentication.
A set of features extracted for activity recognition and user authentication.
| Feature | Symbol | Formula | Domain |
|---|---|---|---|
| Max. Amplitude | Time | ||
| Min. Amplitude | Time | ||
| Mean | Time | ||
| Variance | Time | ||
| Kurtosis | Time | ||
| Skewness | Time | ||
| Peak-to-Peak Signal Value | Time | ||
| Peak-to-Peak Time | Time | ||
| Peak-to-Peak Slope | Time | ||
| Absolute Latency to Amplitude Ratio | Time | ||
| Energy | Freq. | ||
| Entropy | Freq. |
Cluster analysis based on the average silhouette values for different values of K.
| Activity | Body Position | |||||
|---|---|---|---|---|---|---|
| Walking | 0.74 | 0.63 | 0.51 | 0.50 | Waist | |
| 0.81 | 0.76 | 0.57 | 0.56 | Left Thigh | ||
| 0.71 | 0.67 | 0.58 | 0.49 | Right Thigh | ||
| 0.79 | 0.73 | 0.63 | 0.60 | Upper Arm | ||
| 0.80 | 0.65 | 0.51 | 0.40 | Wrist | ||
| Sitting | 0.64 | 0.58 | 0.46 | 0.43 | Waist | |
| 0.68 | 0.63 | 0.50 | 0.45 | Left Thigh | ||
| 0.80 | 0.76 | 0.51 | 0.50 | Right Thigh | ||
| 0.71 | 0.60 | 0.51 | 0.49 | Upper Arm | ||
| 0.64 | 0.56 | 0.40 | 0.20 | Wrist | ||
| Standing | 0.61 | 0.53 | 0.41 | 0.43 | Waist | |
| 0.71 | 0.72 | 0.61 | 0.60 | Left Thigh | ||
| 0.54 | 0.51 | 0.33 | 0.31 | Right Thigh | ||
| 0.44 | 0.32 | 0.30 | Upper Arm | |||
| 0.74 | 0.65 | 0.50 | 0.48 | Wrist | ||
| Running | 0.54 | 0.43 | 0.36 | 0.35 | Waist | |
| 0.79 | 0.76 | 0.57 | 0.50 | Left Thigh | ||
| 0.51 | 0.41 | 0.21 | 0.21 | Right Thigh | ||
| 0.46 | 0.62 | 0.41 | 0.41 | Upper Arm | ||
| 0.84 | 0.70 | 0.50 | 0.49 | Wrist | ||
| Sitting | 0.64 | 0.58 | 0.46 | 0.43 | Waist | |
| 0.68 | 0.63 | 0.50 | 0.45 | Left Thigh | ||
| 0.80 | 0.76 | 0.51 | 0.50 | Right Thigh | ||
| 0.71 | 0.60 | 0.51 | 0.49 | Upper Arm | ||
| 0.64 | 0.56 | 0.40 | 0.20 | Wrist | ||
| Walking Upstairs | 0.71 | 0.63 | 0.56 | 0.49 | Waist | |
| 0.73 | 0.54 | 0.50 | Left Thigh | |||
| 0.77 | 0.70 | 0.61 | 0.60 | Right Thigh | ||
| 0.70 | 0.51 | 0.44 | 0.40 | Upper Arm | ||
| 0.51 | 0.46 | 0.25 | 0.24 | Wrist | ||
| Walking Downstairs | 0.81 | 0.73 | 0.58 | 0.40 | Waist | |
| 0.77 | 0.67 | 0.57 | 0.53 | Left Thigh | ||
| 0.72 | 0.61 | 0.40 | 0.31 | Right Thigh | ||
| 0.51 | 0.62 | 0.31 | 0.26 | Upper Arm | ||
| 0.67 | 0.56 | 0.47 | 0.45 | Wrist |
Figure 3Average distance between the learned centroids and the new centroids for different training sets.
Figure 4Effect of varying value on the threshold values and .
Figure 5Individual classification accuracies of selected activities when classified with DT, K-NN, BN, and SVM classifiers for five different body positions: (a) waist; (b) left thigh; (c) right thigh; (d) upper arm; (e) wrist.
Performance metrics of the selected classifiers for activity recognition at five body positions.
| Classifier | Average Accuracy % | Kappa | F-Measure | MAE | RMSE | Body Position |
|---|---|---|---|---|---|---|
| Decision Tree | 96.23 | 0.99 | 0.96 | 0.012 | 0.111 | Waist |
| K-NN | 92.53 | 0.91 | 0.92 | 0.025 | 0.157 | |
| Bayes Net | 97.55 | 0.97 | 0.97 | 0.008 | 0.088 | |
| SVM | 99.71 | 1.00 | 0.99 | 0.222 | 0.310 | |
| Decision Tree | 98.90 | 0.98 | 0.99 | 0.004 | 0.067 | Left Thigh |
| K-NN | 95.23 | 0.94 | 0.95 | 0.016 | 0.125 | |
| Bayes Net | 98.57 | 0.98 | 0.98 | 0.005 | 0.061 | |
| SVM | 99.81 | 1.00 | 1.00 | 0.222 | 0.310 | |
| Decision Tree | 97.87 | 0.97 | 0.98 | 0.007 | 0.083 | Right Thigh |
| K-NN | 95.23 | 0.94 | 0.95 | 0.016 | 0.125 | |
| Bayes Net | 98.01 | 0.97 | 0.98 | 0.006 | 0.080 | |
| SVM | 99.47 | 0.99 | 0.99 | 0.222 | 0.310 | |
| Decision Tree | 95.93 | 0.95 | 0.96 | 0.014 | 0.121 | Upper Arm |
| K-NN | 92.58 | 0.91 | 0.95 | 0.025 | 0.157 | |
| Bayes Net | 95.45 | 0.94 | 0.95 | 0.015 | 0.115 | |
| SVM | 98.75 | 0.98 | 0.99 | 0.222 | 0.310 | |
| Decision Tree | 95.18 | 0.94 | 0.95 | 0.017 | 0.124 | Wrist |
| K-NN | 90.93 | 0.89 | 0.91 | 0.031 | 0.173 | |
| Bayes Net | 96.85 | 0.96 | 0.97 | 0.015 | 0.100 | |
| SVM | 98.18 | 0.97 | 0.98 | 0.222 | 0.311 |
Average performance metrics of the selected classifiers for activity recognition.
| Classifier | Average Accuracy % | Kappa | F-Measure | MAE | RMSE |
|---|---|---|---|---|---|
| Decision Tree | 96.82 | 0.96 | 0.96 | 0.010 | 0.102 |
| K-NN | 93.30 | 0.91 | 0.93 | 0.022 | 0.147 |
| Bayes Net | 97.38 | 0.96 | 0.97 | 0.027 | 0.086 |
| SVM | 99.18 | 0.98 | 0.99 | 0.222 | 0.310 |
Figure 6Computational time taken by different classifiers for activity classification.
Distribution of different users amongst three folds for user classification.
| Scenario | No. of Users in Fold-1 | No. of Users in Fold-2 | No. of Users in Fold-3 |
|---|---|---|---|
| A | 2 | 4 | 4 |
| B | 2 | 3 | 5 |
| C | 3 | 3 | 4 |
| D | 3 | 4 | 3 |
| E | 4 | 3 | 3 |
Figure 7Euclidean distance between the authenticated user class feature vector and the feature vectors computed from testing data for different candidate users.
Figure 8Output of the classification model at different time intervals while classifying a candidate user belonging to the authenticated class.
Results of user classification based on activity recognition at five body positions.
| User Class | TPR | FPR | Precision | Recall | F-Measure | Body Position |
|---|---|---|---|---|---|---|
| Authenticated | 0.90 | 0.04 | 0.90 | 0.90 | 0.90 | Waist |
| Supplementary | 0.91 | 0.03 | 0.92 | 0.91 | 0.91 | |
| Impostor | 0.95 | 0.04 | 0.93 | 0.95 | 0.94 | |
| Authenticated | 0.92 | 0.04 | 0.90 | 0.91 | 0.90 | Left Thigh |
| Supplementary | 0.90 | 0.03 | 0.92 | 0.90 | 0.91 | |
| Impostor | 0.91 | 0.05 | 0.91 | 0.90 | 0.91 | |
| Authenticated | 0.90 | 0.04 | 0.89 | 0.90 | 0.90 | Right Thigh |
| Supplementary | 0.88 | 0.04 | 0.89 | 0.88 | 0.88 | |
| Impostor | 0.91 | 0.06 | 0.90 | 0.91 | 0.90 | |
| Authenticated | 0.85 | 0.06 | 0.86 | 0.85 | 0.85 | Upper Arm |
| Supplementary | 0.86 | 0.06 | 0.85 | 0.86 | 0.86 | |
| Impostor | 0.86 | 0.09 | 0.86 | 0.86 | 0.86 | |
| Authenticated | 0.82 | 0.07 | 0.83 | 0.82 | 0.82 | Wrist |
| Supplementary | 0.83 | 0.06 | 0.85 | 0.83 | 0.84 | |
| Impostor | 0.90 | 0.09 | 0.86 | 0.90 | 0.88 |
Figure 9Individual classification accuracies of different user classes at five different body positions.