| Literature DB >> 35808354 |
Matteo Nerini1, Elia Favarelli2, Marco Chiani2.
Abstract
Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel. In this paper, we increase the security of PIN-based authentication by considering behavioral biometrics, specifically the smartphone movements typical of each user. To this end, we propose a method based on anomaly detection that is capable of recognizing whether the PIN is inserted by the smartphone owner or by an attacker. This decision is taken according to the smartphone movements, which are recorded during the PIN insertion through the built-in motion sensors. For each digit in the PIN, an anomaly score is computed using Machine Learning (ML) techniques. Subsequently, these scores are combined to obtain the final decision metric. Numerical results show that our authentication method can achieve an Equal Error Rate (EER) as low as 5% in the case of 4-digit PINs, and 4% in the case of 6-digit PINs. Considering a reduced training set, composed of solely 50 samples, the EER only slightly worsens, reaching 6%. The practicality of our approach is further confirmed by the low processing time required, on the order of fractions of milliseconds.Entities:
Keywords: Machine Learning; Personal Identification Number; behavioral biometrics; cyber security; motion sensors
Mesh:
Year: 2022 PMID: 35808354 PMCID: PMC9269565 DOI: 10.3390/s22134857
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Anomaly detection-based authentication block diagram.
Anomaly scores summary.
| Anomaly Score Description | Anomaly Score Range | Detection | |
|---|---|---|---|
| PCA | Opposite reconstruction error |
|
|
| K-PCA | Opposite reconstruction error |
| |
| OC-SVM | Signed distance to the separating hyperplane |
| |
| LOF | Shifted opposite local outlier factor |
|
Figure 2ROCs and AUC for different PIN lengths N. Working points corresponding to the MBA are marked with circles. (a) 3-digit PIN; (b) 4-digit PIN; (c) 6-digit PIN.
Figure 3EER and MBA for different training set sizes and PIN lengths N. (a) 3-digit PIN; (b) 4-digit PIN; (c) 6-digit PIN.
Figure 4Denial of access probability for different number of consecutive attempts and PIN lengths N. (a) 3-digit PIN; (b) 4-digit PIN; (c) 6-digit PIN.
Processing time (ms) of the considered anomaly detectors for different PIN lengths N.
| PCA | K-PCA | OC-SVM | LOF | |
|---|---|---|---|---|
|
| 0.104 | 0.907 | 0.143 | 0.623 |
|
| 0.122 | 0.931 | 0.152 | 0.630 |
|
| 0.108 | 0.993 | 0.165 | 0.631 |
Figure 5PCA of the entire dataset, where different colors correspond to different students, projected onto the first three components. The percentage of variance explained by the first, second, and third principal component is , , and , respectively.