Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Hassan Sbeyti
Pages - 120 - 139 | Revised - 31-08-2016 | Published - 01-10-2016
MORE INFORMATION
KEYWORDS
Security, Implicit Authentication, Behavioral Modeling.
ABSTRACT
Smart devices are equipped with multiple authentication techniques and still remain prone to attacks since all of these techniques require explicit user intervention. The purpose of this paper is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the existing models; Particularly, the context of the user, the duration of usage of each application and the occurrence time were examined and modeled using the cubic spline function as an authentication technique. A software system composed of two software components has been implemented on Android platform. Preliminary results show a 76% accuracy rate in determining the rightful owner of the device.
In this paper, we introduce a novel authentication model to be used complementary to the existing models; Particularly, the context of the user, the duration of usage of each application and the occurrence time were examined and modeled using the cubic spline function as an authentication technique. A software system composed of two software components has been implemented on Android platform. Preliminary results show a 76% accuracy rate in determining the rightful owner of the device.
B. El-Hage. "Mobile user signature extraction based on user behavioral pattern." MSC thesis, Arab Open University - Faculty of Computer Studies, Lebanon, 2015. | |
Bo, Cheng, et al. "SilentSense: silent user identification via touch and movement behavioral biometrics," in Proc. of the 19th annual international conference on Mobile computing and networking. ACM, 2013. | |
Clarke. "Furnell. Authenticating mobile phone users using keystroke analysis." International Journal of Information Security, vol. 6.1, pp. 1-14, 2007. | |
D.B. Sae-Bae, Napa, et al. "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in Proc. SIGCHI Conference on Human Factors in Computing Systems ACM, 2012, pp. | |
De Luca, Alexander, et al. "Touch me once and i know it's you!: implicit authentication based on touch screen patterns", in Proc. of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012. | |
Enisa.europa.eu."Top Ten Smartphone Risks ENISA. Internet: https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical-applications/smartphone-security-1/top-ten-risks, Oct. 25, 2000 [Nov. 24, 2015]. | |
Fischer, Ian Timothy, et al. "Short paper: Smartphones: Not smart enough?," in Proc. of the second ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2012. | |
Gafurov, Davrondzhon, Kirsi Helkala, and Torkjel SÞndrol. "Biometric gait authentication using accelerometer sensor." Journal of computers, vol. 1.7, pp. 51-59, 2006. | |
H. Sbeyti et al. "Standardized Scalable Relocatable Context-Aware Middleware for Mobile Applications. Internet: www.scammp-project.info 2014 [June. 28, 2016]. | |
H. Sbeyti, B. ElHajj, A. Fadlallah "Mobile user signature extraction based on user behavioral pattern(MUSEP)" International Journal of Pervasive Computing and Communications, Vol. 12, No. 4, October 2016. | |
H. Sbeyti, M. Malli, A. Fadlallah, K. Tahat, M. Youssef, " Scalable extensible Middleware framework for context-aware Mobile applications.", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Vol. 7.3, No. 3, September 2016. | |
Jakobsson, Shi, et al. "Implicit authentication for mobile devices," in Proc. of the 4th USENIX conference on Hot topics in . USENIX Association, 2009. | |
Khan, Hassan, Aaron Atwater, and Urs Hengartner. "Itus: an implicit authentication framework for android," in Proc. of the 20th annual international conference on Mobile computing and networking. ACM, 2014. | |
Khan, Hassan, and Urs Hengartner. "Towards application-centric implicit authentication on smartphones," in Proc. of the 15th Workshop on Mobile Computing Systems and Applications. ACM, 2014. | |
Klasson, K.T., (2008). Construction of spline functions in spreadsheets to smooth experimental data. Advances in Engineering Software, 39(5), pp.422-429. | |
M, Jani, et al. "Identifying users of portable devices from gait pattern with accelerometers," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, 2005. | |
M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication." IEEE Transactions on Information Forensics and Security, vol. 8(1, pp. 136148, Jan. 2013. | |
McKinley, S. and Levine, M., (1998) Cubic Spline Interpolation. College of the Redwoods. | |
Monotonic cubic spline interpolation. In Computer Graphics International, 1999. Proceedings (pp. 188-195). IEEE. | |
Osgood, B., (2013). Lecture notes for EE 261: the Fourier transform and its applications. Stanford Engineering Everywhere. | |
Rao, K.R., Kim, D.N. and Hwang, J.J., (2011). Fast Fourier Transform-Algorithms and Applications. Springer Science & Business Media. | |
Sae-Bae, Napa, et al. "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in Proc. of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012. | |
Saevanee, H., and P. Bhattarakosol. "Authenticating user using keystroke dynamics and finger pressure," in Proc. CCNC Consumer Communications and Networking Conference, 2009. | |
Stober, Tim, et al. "Who do you sync you are?: smartphone fingerprinting via application behavior," in Proc. of the sixth ACM conference on Security and privacy in wireless and mobile networks. ACM, 2013. | |
Wang, Yuan, Yunhong Wang, and Tieniu Tan. "Combining fingerprint and voiceprint biometrics for identity verification: an experimental comparison" in Book Biometric Authentication, Ed. Berlin Heidelberg: Springer, 2004, 663-670. | |
Yazji, Sausan. "Implicit user re-authentication for mobile devices," in Ubiquitous Intelligence and Computing, Berlin Heidelberg: Springer, 2009, pp. 325-339. | |
Zhu, Jiang, et al. "Mobile security through passive sensing," in Proc. of the Computing, Networking and Communications (ICNC). IEEE, 2013. | |
Dr. Hassan Sbeyti
Faculty of computer Studies, Arab Open Univeristy - Lebanon
hsbeity@aou.edu.lb
|
|
|
|
View all special issues >> | |
|
|