Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

Recently, mobile technology has become closely linked with our daily activities. Smartphones are used for multiple personal tasks involving private information, such as communication, healthcare, and banking. Therefore, there is a high demand for user-friendly authentication methods that prevent unauthorized access to sensitive information. This paper proposes a novel feature representation tactic for continuous authentication named Multiple Channels Biological Graph (MCBG). Unlike conventional techniques, MCBG divides the smartphone usage scenarios into more fine-grained cases, including the operation interval features. To this end, we extract the screen touch and handheld features from multiple built-in sensors without extra user interaction. We conduct experiments on 180 participants (130 adults and 50 minors) and investigate the sufficiency of different sensor combinations required to authenticate identity accurately. Results show that our MCBG-based model achieves 99.38% authentication accuracy within 1.9 seconds. Furthermore, MCBG also represents the intrinsic differences between grown-ups and minors, achieving 96% identification accuracy.

Cite

CITATION STYLE

APA

Wang, H., He, H., Song, C., Tang, H., Sun, Y., Qiao, Y., & Zhang, W. (2022). Who Is Using the Phone? Representation-Learning-Based Continuous Authentication on Smartphones. Security and Communication Networks, 2022. https://doi.org/10.1155/2022/6339407

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free