| Literature DB >> 30400377 |
José María Jorquera Valero1, Pedro Miguel Sánchez Sánchez2, Lorenzo Fernández Maimó3, Alberto Huertas Celdrán4, Marcos Arjona Fernández5, Sergio De Los Santos Vílchez6, Gregorio Martínez Pérez7.
Abstract
Continuous authentication systems for mobile devices focus on identifying users according to their behaviour patterns when they interact with mobile devices. Among the benefits provided by these systems, we highlight the enhancement of the system security, having permanently authenticated the users; and the improvement of the users' quality of experience, minimising the use of authentication credentials. Despite the benefits of these systems, they also have open challenges such as the authentication accuracy and the adaptability to new users' behaviours. Continuous authentication systems should manage these challenges without forgetting critical aspects of mobile devices such as battery consumption, computational limitations and response time. With the goal of improving these previous challenges, the main contribution of this paper is the design and implementation of an intelligent and adaptive continuous authentication system for mobile devices. The proposed system enables the real-time users' authentication by considering statistical information from applications, sensors and Machine Learning techniques based on anomaly detection. Several experiments demonstrated the accuracy, adaptability, and resources consumption of our solution. Finally, its utility is validated through the design and implementation of an online bank application as proof of concept, which allows users to perform different actions according to their authentication level.Entities:
Keywords: adaptability; anomaly detection; applications; continuous authentication; cybersecurity; machine learning; mobile devices; sensors
Mesh:
Year: 2018 PMID: 30400377 PMCID: PMC6263905 DOI: 10.3390/s18113769
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Phases and processes of the proposed adaptive and continuous authentication system.
Final features selected for each category.
| Dimension | Features |
|---|---|
| Sensors (Gyroscope and Accelerometer) | Mean value for X, Y, Z and Magnitude (calculated as |
| Maximum value for X, Y, Z and Magnitude | |
| Minimum value for X, Y, Z and Magnitude | |
| Variance value for X, Y, Z and Magnitude | |
| Peak-to-peak value (max-min) for X, Y, Z and Magnitude | |
| Application usage statistics | Number of apps and number of different apps opened for the last day and the last minute. |
| App most times used and number of times used in the last minute. The same for the last day. | |
| Last and next-to-last apps used. | |
| Application most frequently used just before the currently active application. | |
| Bytes sent and received during the last minute. |
Computational complexity of IF, OC-SVM, and LOF. The variables are explained in the text.
| Computational Complexity | ||
|---|---|---|
| Algorithm | Training | Evaluation of One Sample |
| Isolation Forest [ |
|
|
| One-Class SVM [ | Between |
|
| Local Outlier Factor [ |
|
|
Figure 2Diagram of the most important classes and processes of the system.
Configuration parameters to train the Isolation Forest algorithm.
| Method | Frequency | Parameters | Return |
|---|---|---|---|
| After phase 1 | Dataset (15 days), | ||
| buildClassifier() | Every positive evaluation | Number of decision trees (100), | Nothing |
| Sample size (256) |
Although BuildClassifier() does not return anything, this method is responsible for generating decision trees that later will be used during the evaluation phase.
Configuration parameters to evaluate the Isolation Forest algorithm.
| Method | Frequency | Parameters | Return |
|---|---|---|---|
| distributionForInstance() | Each 60 s | Current features vector | Double (0.0–1.0) |
List of initial features.
| Dimensions | Features |
|---|---|
| Sensors (Gyroscope, Accelerometer and Magnetometer) | Mean value for X, Y, Z and Magnitude (calculated as |
| Maximum value for X, Y, Z and Magnitude. | |
| Variance value for X, Y, Z and Magnitude. | |
| Minimum value for X, Y, Z and Magnitude. | |
| Peak-to-peak (max-min) value for X, Y, Z and Magnitude. | |
| Application usage statistics | Number of apps and number of different apps, open since the system has information. The same for the last day and the last minute. |
| Apps most frequently used, average use time, and number of times used in the last minute. The same for the last day. | |
| Last and next-to-last apps used, number of times and average use time. | |
| Application most frequently used just before the currently active application and number of uses. | |
| Bytes sent and received during the last minute. |
Figure 3Area under the curve (AUC) of our model trained with both the initial and selected set of features.
Figure 4Recall, precision and F1-score vs. threshold when our model is trained with only the selected features from UserA’s dataset, and evaluated on users A and B.
UserA (normal) vs. UserB (anomalous) confusion matrix.
| UserB Vectors | UserA Vectors | Precision/Recall | Score | |
|---|---|---|---|---|
|
| TP: 92 | FP: 27 | Precision | 77% |
|
| FN: 8 | TN: 73 | Recall | 92% |
Figure 5True positive rate for the 50 evaluated anomalous users.
Figure 6Precision curves on both normal and anomalous behaviours.
Certainty classes defined for the threshold values.
| Threshold | Possible User Behaviour |
|---|---|
|
| Certainly anomalous |
|
| Possibly anomalous |
|
| Possibly normal |
|
| Certainly normal |
Figure 7App evaluation scores of the new application vectors as the number of similar new vectors increases.
Figure 8Sensor evaluation scores of the new sensor vectors as the number of similar new vectors increases.
Figure 9Trial and error attack scores.
Figure 10Shoulder surfing attack scores.
Battery consumption of the adaptive and continuous authentication system.
| Device | Total Battery | mAh Consumed | % Battery Consumed | Execution Time | Time Unlocked |
|---|---|---|---|---|---|
| Xiaomi Redmi Note 4 Pro | 4180 mAh | 293 mAh | 7% | 2 h 5 m | 10 h 9 m |
| Huawei P10 Lite | 3000 mAh | 334 mAh | 11% | 2 h 23 m | 11 h 15 m |
Storage consumption of our adaptive and continuous authentication system.
| Device | App Dataset Size | Vectors in App Dataset | Sensor Dataset Size | Vectors in Sensor Dataset | Device Storage |
|---|---|---|---|---|---|
| Xiaomi Redmi Note 4 Pro | 780 KB | 8700 | 4 MB | 13,800 | 64 GB |
| Huawei P10 Lite | 164 KB | 1670 | 1.7 MB | 7500 | 32 GB |
Time consumption of our adaptive and continuous authentication system.
| Device | Processor | Application Training | Application Evaluation | Sensor Training | Sensor Evaluation |
|---|---|---|---|---|---|
| Xiaomi Redmi Note 4 Pro | Mediatek Helio X20 | 1.5 s | 1.1 ms | 3.4 s | 1.4 ms |
| Huawei P10 Lite | ARM Cortex A53 | 0.9 s | 0.8 ms | 2.1 s | 1.0 ms |
Comparison of the different continuous authentication systems from academia and industry.
| Proposal | Dimensions | Adaptive | ML Technique | Precision |
|---|---|---|---|---|
| Bo et al. [ | Writing Patterns and Sensors | No | OC-SVM SVM | Accuracy: 72.36% |
| Ehatisham-ul-Haq et al. [ | Accelerometer, Gyroscope and Magnetometer | No | k-Means Bayes Net | Accuracy: 87.34–90.78% |
| Fridman et al. [ | Location, Text Written, Visited Websites and Applications Usage | No | SVM | Accuracy: 95% |
| Parreño Centeno et al. [ | Sensors | Yes | Autoencoder | Accuracy: 97.8% |
| Li et al. [ | Gyroscope and Accelerometer | No | OneClass-SVM | FAR |
| De Fuentes et al. [ | Battery, Transmitted data Ambient light, Noise | No | k-NN, Naïve Bayes, Adaptive Hoeffding Trees | Accuracy: 81.35% |
| Weidong Shi et al. [ | Movement, Voice, Location and Screen touches | No | Naïve Bayes | Accuracy: 95–97% |
| Veridium [ | Sensors, Camera, Touchscreen and Multiple Biometrics Factor | Unknown | Unknown | Unknown |
| Aware [ | Speech Recognition, Facial Recognition, Dynamic Key and Fingerprint Recognition | Unknown | Unknown | Unknown |
| Zighra [ | Location, Sensors, Newtorks and user’s writing techniques | Yes | Zigrha Algorithm | Unknown |
| BehavioSec [ | Sensors, Keystrokes and Touchscreen interaction | Yes | BehavioSec algorithms | Accuracy: 97.4–99.7% |
| Our solution | Sensors and Applications Usage | Yes | Isolation Forest | Precision: 77% |
FAR: False Acceptation Rate; EER: Equal Error Rate; FRR: False Rejection Rate; Calculated from Table 6.
Figure 11Flow diagram of the use case.
Thresholds with AL score to perform different actions of the banking application.
| Threshold | Possible Actions |
|---|---|
| 0.0–0.35 | The banking application cannot be opened |
| 0.35–0.67 | Sensitive data and transaction are blocked |
| 0.67–0.78 | Sensitive data and transactions lower than €20 are allowed |
| 0.78–1.0 | Full access |
Figure 12UserB using the online banking application.
Figure 13UserA using the online banking application after UserB.
Figure 14UserA using the online banking application with full access.