A behavioral authentication method for mobile gesture against resilient user posture

The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are easy to be cracked by some malicious software. An important research direction of improving its security is adding behavior pattern into the p...

Full description

Saved in:
Bibliographic Details
Published in2016 3rd International Conference on Systems and Informatics (ICSAI) pp. 324 - 331
Main Authors Qiang Liu, Mimi Wang, Peihai Zhao, Chungang Yan, Zhijun Ding
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are easy to be cracked by some malicious software. An important research direction of improving its security is adding behavior pattern into the password pattern. The existing methods mainly used user's gesture behavior data such as the location, pressure and contact area of finger collected by touch screen to build a behavior authentication model, which did not consider the influence of user's posture on user's gesture behavior. This paper aims to propose a gesture authentication construction method that is resilient against the change of user's posture. Firstly, for the posture behavior data collected by mobile's orientation sensor and acceleration sensor, we use K-means algorithm to get user's postures. Secondly, we train a gesture authentication sub-model for each posture based on the data collected by touch screen. Finally, we give a behavior authentication method based on these models. Our experimental result shows that the method achieves an effect of 4.36% False Acceptance Rate (FAR) and 5.03% False Rejection Rate (FRR).
AbstractList The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are easy to be cracked by some malicious software. An important research direction of improving its security is adding behavior pattern into the password pattern. The existing methods mainly used user's gesture behavior data such as the location, pressure and contact area of finger collected by touch screen to build a behavior authentication model, which did not consider the influence of user's posture on user's gesture behavior. This paper aims to propose a gesture authentication construction method that is resilient against the change of user's posture. Firstly, for the posture behavior data collected by mobile's orientation sensor and acceleration sensor, we use K-means algorithm to get user's postures. Secondly, we train a gesture authentication sub-model for each posture based on the data collected by touch screen. Finally, we give a behavior authentication method based on these models. Our experimental result shows that the method achieves an effect of 4.36% False Acceptance Rate (FAR) and 5.03% False Rejection Rate (FRR).
Author Chungang Yan
Zhijun Ding
Peihai Zhao
Mimi Wang
Qiang Liu
Author_xml – sequence: 1
  surname: Qiang Liu
  fullname: Qiang Liu
  organization: Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
– sequence: 2
  surname: Mimi Wang
  fullname: Mimi Wang
  organization: Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
– sequence: 3
  surname: Peihai Zhao
  fullname: Peihai Zhao
  organization: Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
– sequence: 4
  surname: Chungang Yan
  fullname: Chungang Yan
  organization: Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
– sequence: 5
  surname: Zhijun Ding
  fullname: Zhijun Ding
  organization: Dept. of Comput. Sci. & Technol., Tongji Univ., Shanghai, China
BookMark eNotj81qhDAUhVNoF51pX6Dd5AW0ucZEsxTpjzDQRd0PV3MdA2qGGAt9-w7trA6cj_PB2bHbxS_E2BOIFECYl6b-qpo0E6DTorwUhb5hO1DCCKUyUPesrXhHI347H3DiuMWRluh6jM4vfKY4essHH_jsOzcRP9Eat0AcT-iWNfJAq5vcZcK3lQI_-z_8wO4GnFZ6vOaetW-vbf2RHD7fm7o6JM6ImHR6sAqoA5lbMNAZNBqKcpC5LLEvASHvbZ8h6t7CYMpO9qiNsijUUIBGuWfP_1pHRMdzcDOGn-P1p_wFxJdO2w
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICSAI.2016.7810976
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Law
EISBN 1509055215
9781509055210
EndPage 331
ExternalDocumentID 7810976
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-b6fd51eb134d191b9a96178f3438ac81a14cdc2aa6cd1f98b3ca695da05f716a3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:27 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-b6fd51eb134d191b9a96178f3438ac81a14cdc2aa6cd1f98b3ca695da05f716a3
PageCount 8
ParticipantIDs ieee_primary_7810976
PublicationCentury 2000
PublicationDate 2016-Nov.
PublicationDateYYYYMMDD 2016-11-01
PublicationDate_xml – month: 11
  year: 2016
  text: 2016-Nov.
PublicationDecade 2010
PublicationTitle 2016 3rd International Conference on Systems and Informatics (ICSAI)
PublicationTitleAbbrev ICSAI
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6559842
Snippet The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are...
SourceID ieee
SourceType Publisher
StartPage 324
SubjectTerms Acceleration
Authentication
Behavioral Authentication
Feature extraction
Gesture Behavior
Law
Mobile communication
Password Pattern
Time series analysis
User Posture
Title A behavioral authentication method for mobile gesture against resilient user posture
URI https://ieeexplore.ieee.org/document/7810976
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anjz5aMU3e_Bo0sRs0uyxFEsrVgQj9FZmH5GiJqUkCP56Z5O0RfHgLSRLEnbYnflmvm8H4DoS5BQNrbQUA-lwbYQlAQSOCAVX5EHjlFuh8Owxmrzw-3k4b8HNVgtjjKnIZ8a1l1UtX-eqtKmy_iC29dKoDW0CbrVWa6OD8UR_OnoeTi1ZK3KbgT86plQOY7wPs82nap7Im1sW0lVfv05h_O-_HEBvJ81jT1uncwgtkx1B-wE_u5AM2U50z9BS17OiScmxulM0oxCVfeSStgJmC0vl2jB8xSXFiIxw9_LdqiOZTVywVV497kEyvktGE6dpmuAshVc4Mkp16NMGHHBNUEwKFFYEmAY8iFHFPvpcaXWLGCntpyKWgcJIhBq9MCXohMExdLI8MyfAJBoy3QApiFEcTSxSbQy9yxOGYJYenELXTstiVR-LsWhm5Ozv2-ewZ01Ty_guoFOsS3NJ_ryQV5UhvwEpqqP7
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LT8JAEJ4AHvTkA4xv96DH8uqD7sEDQQmVR0zEhBvZ7k4NUQuBEqJ_xb_ij3O2LRCNVxJvTZtsOpnZndf3zQJcOZycItJOC4TpG5ZCrkEApsFtbknyoG5gaaJwt-e0nqz7gT3IwOeKC4OIMfgMi_ox7uWrsZzrUlmp5up-qZNCKNv4vqAEbXbj3ZI2r6vV5l2_0TLSOwSMES9Hhu8Eyq7QeWRaijITnwuuOXGBaZmukG5FVCypZFUIR6pKwF3flMLhthJlO6BMQpi0bBa2KMywqwk5bEm8KfOS13isexod5hTTP_txRUvsoZq78LWULQGmvBTnkV-UH7_GPv5T4fegsKYesoeVU92HDIYHkO2IRR76dbYeKsCEhuaHUVpyZMlN2IxCcPY29umoY7pxNp8iE89iRDEwm-Js9KrZn0wXZthkHH8uQH8TMh1CLhyHeATMF0imWRMUpElLoMsDhUhrlTlSGqlqx5DXWhhOkrEfw1QBJ3-_voTtVr_bGXa8XvsUdrRVJJTFM8hF0zmeU-wS-RexDTEYblht35wKAj0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+3rd+International+Conference+on+Systems+and+Informatics+%28ICSAI%29&rft.atitle=A+behavioral+authentication+method+for+mobile+gesture+against+resilient+user+posture&rft.au=Qiang+Liu&rft.au=Mimi+Wang&rft.au=Peihai+Zhao&rft.au=Chungang+Yan&rft.date=2016-11-01&rft.pub=IEEE&rft.spage=324&rft.epage=331&rft_id=info:doi/10.1109%2FICSAI.2016.7810976&rft.externalDocID=7810976