Cargando…
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponentia...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620999/ https://www.ncbi.nlm.nih.gov/pubmed/28878177 http://dx.doi.org/10.3390/s17092043 |
_version_ | 1783267664150396928 |
---|---|
author | Ehatisham-ul-Haq, Muhammad Azam, Muhammad Awais Loo, Jonathan Shuang, Kai Islam, Syed Naeem, Usman Amin, Yasar |
author_facet | Ehatisham-ul-Haq, Muhammad Azam, Muhammad Awais Loo, Jonathan Shuang, Kai Islam, Syed Naeem, Usman Amin, Yasar |
author_sort | Ehatisham-ul-Haq, Muhammad |
collection | PubMed |
description | Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. |
format | Online Article Text |
id | pubmed-5620999 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-56209992017-10-03 Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing Ehatisham-ul-Haq, Muhammad Azam, Muhammad Awais Loo, Jonathan Shuang, Kai Islam, Syed Naeem, Usman Amin, Yasar Sensors (Basel) Article Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. MDPI 2017-09-06 /pmc/articles/PMC5620999/ /pubmed/28878177 http://dx.doi.org/10.3390/s17092043 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ehatisham-ul-Haq, Muhammad Azam, Muhammad Awais Loo, Jonathan Shuang, Kai Islam, Syed Naeem, Usman Amin, Yasar Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title | Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title_full | Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title_fullStr | Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title_full_unstemmed | Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title_short | Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing |
title_sort | authentication of smartphone users based on activity recognition and mobile sensing |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5620999/ https://www.ncbi.nlm.nih.gov/pubmed/28878177 http://dx.doi.org/10.3390/s17092043 |
work_keys_str_mv | AT ehatishamulhaqmuhammad authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT azammuhammadawais authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT loojonathan authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT shuangkai authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT islamsyed authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT naeemusman authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing AT aminyasar authenticationofsmartphoneusersbasedonactivityrecognitionandmobilesensing |