MOBILE USER AUTHENTICATION ALGORITHM USING PERSONALIZED BEHAVIOR PATTERN RECOGNITION

Published 30 Apr 2020 •  vol 137  • 


Authors:

 

Junho Ahn, Department of Software, Korea National University of Transportation, Chungju, South Korea

Abstract:

 

Smartphone applications with inbuilt user authentication are widely used to provide mobile credential services in the real world. Certain mobile applications can detect an authentic user by recognizing his/her pin code, pattern, or through biological recognition of his/her fingerprints or iris to access servers. Such smartphone authentication methods can be time consuming and annoying for users, especially those who are not comfortable with smartphones and/or learning new techniques. In this study, an automatic user authentication algorithm was designed using personalized behavior classifications pertaining to the user’s activity, audio, and location patterns in his/her daily life. Furthermore, real-world mobile user data in terms of location, activity, and audio was collected, and the feasibility of the algorithm was evaluated by analyzing the mobile user behaviors. According to the data collected from 15 mobile users during a one-month period, the users’ behavior patterns are repeated within one week. As users have their own unique daily behavioral patterns, they can be used for the authentication process.

Keywords:

 

Authentication, Smartphone, Daily Pattern, Activity, Audio, Fusion

References:

 

[1] B. Erkmen, N. Kahraman, R. A. Vural, and T. Yildirim, "Conic section function neural network circuitry for offline signature recognition," IEEE Transactions on Neural Networks, 2010.
[2] M. M. Fahmy. "Online handwritten signature verification system based on DWT features extraction and neural network classification," Ain Shams Engineering Journal, 1(1):59–70, 2010.
[3] C. Gruber, T. Gruber, S. Krinninger, and B. Sick. "Online signature verification with support vector machines based on lcss kernel functions," IEEE Transactions on Systems, Man, and Cybernetics, PartB: Cybernetics, 40(4):1088–1100, 2010.
[4] M. Shahzad A. X. Liu and A. Samuel, "Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures," IEEE Transactions on Mobile Computing, Volume: 16, Issue: 10, Oct. 1, 2017.
[5] H. Gascon, S. Uellenbeck, C. Wolf, K. Rieck, "Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior," Proceedings of theGI Conference Sicherheit, Vienna. Gayathri, 2014.
[6] A. D. Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann. "Touch me once and i know it’s you!: implicit authentication based on touch screen patterns," In Proceedings of ACM Annual Conference on Human Factors in Computing Systems (SIGCHI), 2012.
[7] M. Conti, I. Zlatea, and B. Crispo. "Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call," In Proceedings of ACM Symposium on Information, Computer and Communications Security, pages 249–259, 2011.
[8] S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq. "Keystrokebased user identification on smart phones," In Proceedings of 12th Int. Symposium on RAID, 2009.
[9] J. Kwapisz, G. Weiss, and S. Moore. "Cell phone-based biometric identification," In Proceedings of IEEE Inc. Conference. on Biometrics: Theory Applications and Systems, 2010.
[10] J. Ahn, R. Han, "myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection," Sensors, Volume 16, Issue 5, 753, 20 pages. 2016.
[11] J. Ahn, R. Han, "Personalized behavior pattern recognition and unusual event detection for mobile users," Mobile Information Systems, 9, 99–122. 2013.
[12] Amit Adam, Ehud Rivlin, Ilan Shimshoni, and David Reinitz, "Robust real-time unusual event detection using multiple fixed-location monitors," IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(3):555–560, 2008.
[13] Charalampos Doukas, Ilias Maglogiannis, Aggelos Rouskas, and Aristodimos Pneumatikakis. "Emergency incidents detection in assisted living environments utilizing sound and visual perceptual components," In Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, ACM, PETRA ’09, pages 14:1–14:7, New York, NY, USA, 2009.
[14] Monisha Mohan, Arun P.S, "ACCELEROMETER–BASED HUMAN FALL DETECTION AND RESPONSE USING SMARTPHONES," International Journal of Computer Engineering In Research Trends, 5, 2017.
[15] Zishan Zahidul Islam, Syed Mahir Tazwar, Md. Zahidul Islam, Seiichi Serikawa and Md. Atiqur Rahman Ahad, "Automatic Fall Detection System of Unsupervised Elderly People Using Smartphone," IIAE International Conference on Intelligent Systems and Image Processing, 7, 2017.
[16] José Antonio Santoyo-Ramón, Eduardo Casilari OrcID and José Manuel Cano-García, "Analysis of a Smartphone-Based Architecture with Multiple Mobility Sensors for Fall Detection with Supervised Learning", Sensors 2018, 18(4), 1155; 10.3390/s18041155.
[17] Suparna Biswas, Tanima Bhattacharya, Ramesh Saha, "On Fall Detection Using Smartphone Sensors", 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2018). 10.1109/WiSPNET.2018.8538688.
[18] Ahmad Jalal, Majid A. K. Quaid, M. A. Sidduqi, "A Triaxial Acceleration-based Human Motion Detection for Ambient Smart Home System", 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (2019). 10.1109/IBCAST.2019.8667183.
[19] E. Miluzzo, N. Lane, K. Fodor, R. Peterson, and H. Lu, M. Musolesi, S. Eisenman, X. Zheng, and A. Campbell, "Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application," In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ’08, Raleigh, NC, USA, 4–7 November 2008; pp. 337–350, 2008.
[20] Sangmin Lee, "User Behavior of Mobile Enterprise Applications," Sangmin Lee, KSII Tracsactions on Internet and information systems, Vol. 10, No.8, August 31, 2016.
[21] Y. Cai and K.D. Pados, "Sound recognition". Springer, 5897:16–34, 2011.
[22] Subhasmita Sahoo, Aurobinda Routray, "Detecting Aggression in Voice Using Inverse Filtered Speech Features", IEEE Transactions on Affective Computing Volume: 9, Issue: 2, April-June 1 2018, pp.217 – 226, 10.1109/TAFFC.2016.2615607.
[23] Minkyu Lim, Donghyun Lee, Hosung Park, Yoseb Kang, Junseok Oh, Jeong-Sik Park, Gil-Jin Jang and Ji-Hwan Kim, "Convolutional Neural Network based Audio Event Classification," KSII Transactions on Internet and Information Systems, vol. 12, no. 6, pp. 2748-2760, 2018. 10.3837/tiis.2018.06.01.
[24] Xuan Bao and Romit Roy Choudhury, "MoVi: Mobile Phone based Video Highlights via Collaborative Sensing," In Proc. MobiSys 2010, pages 357–370. ACM Press, 2010.
[25] B. Logan, "Mel Frequency Cepstral Coefficients for Music Modeling," In In International Symposium on Music Information Retrieval, 2000.
[26] H. Permuter, J. Francos and I.H. Jermyn., "Gaussian mixture models of texture and colour for image database retrieval," In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP ’03). IEEE Press, 2003.
[27] L. Breiman, "Bagging predictors," Mach. Learn., 24, 123–140, 1996.
[28] Y. Freund, R. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting," J. Comput. Syst. Sci. 1997, 55, 119–139, 1997.
[29] C.J.C. Burges, "A tutorial on support vector machines for pattern recognition," Knowl. Discov. Data Min. 1998, 2, 121–167, 1998.
[30] JSON (JavaScript Object Notation), 1999, http://json.org/.
[31] JSON (spring Roo), 2013, http://www.springsource.org/spring-roo.
[32] MongoDB, 2011, http://www.mongodb.org.

Citations:

 

APA:
Ahn, J (2020). Mobile User Authentication Algorithm using Personalized Behavior Pattern Recognition. International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, 137, 11-22. doi: 10.33832/ijast.2020.137.02.

MLA:
Ahn, Junho, “Mobile User Authentication Algorithm using Personalized Behavior Pattern Rec.” International Journal of Advanced Science and Technology, ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 137, 2020, pp. 11-22. IJAST, http://article.nadiapub.com/IJAST/Vol137/2.html.

IEEE:
[1] J. Ahn, "Mobile User Authentication Algorithm using Personalized Behavior Pattern Recognition." International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 137, pp. 11-22, Apr 2020.