Abstract
Mobile devices especially mobile phones have become a major target for cyber-criminals, there is a great need to design appropriate authentication mechanisms to protect users’ private information. The majority of smartphones offers a touchscreen where users can perform various touch actions. Thus, touch behavioral authentication is considered to be an important way to complement the existing textual passwords. Most behavioral schemes usually adopt machine learning techniques to profile users’ touch behaviors; however, machine learning-based schemes suffer from unstable performance, which would greatly reduce the system usability, i.e., causing a high false rejection. In this chapter, we advocate the effectiveness of intelligent touch behavioral authentication, and propose a cloud-based scheme to further reduce the workload by offloading both classifier selection and behavioral modelling to a cloud. Our experimental results demonstrated that our scheme can greatly reduce the required workload to complete user authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
A Beta version of our customized-Android OS can be downloaded from SourceForge: https://sourceforge.net/projects/touchdynamicsauthentication/files/Android_OS/.
- 3.
References
A.J. Aviv, K. Gibson, E. Mossop, M. Blaze, J.M. Smith, Smudge attacks on smartphone touch screens, in Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT) (USENIX Association, Berkeley, 2010), pp. 1–10
F. Bergadano, D. Gunetti, C. Picardi, User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)
N.D.W. Cahyani, B. Martini, K.K.R. Choo, A.M.N. Al-Azhar. Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study. Concurrency Comput.: Practice and Experience 29(14), e3855 (2017)
N.L. Clarke, S.M. Furnell, Telephones–a survey of attitudes and practices. Comput. Secur. 24(7), 519–527 (2005)
N.L. Clarke, S.M. Furnell, Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007)
L. Chang, Smartphone usage soars in US as other devices’ popularity declines (2015). Available at: https://www.digitaltrends.com/mobile/us-smartphone-usage-soars/
J. Dai, J. Zhou, Multifeature-based high-resolution palmprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 33(5), 945–957 (2011)
Deloitte, Global Mobile Consumer Survey (2017). https://www2.deloitte.com/content/dam/Deloitte/be/Documents/technology-media-telecommunications/global-mobile-consumer-survey-2017_belgian-edition.pdf
P. Dunphy, A.P. Heiner, N. Asokan, A closer look at recognition-based graphical passwords on mobile devices, in Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS) (ACM, New York, 2010), pp. 1–12
T. Feng, Z. Liu, K.-A. Kwon, W. Shi, B. Carbunary, Y. Jiang, N. Nguyen, Continuous mobile authentication using touchscreen gestures, in Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST) (IEEE, Piscataway, 2012), pp. 451–456
D. Fiorella, A. Sanna, F. Lamberti, Multi-touch user interface evaluation for 3D object manipulation on mobile devices. J. Multimodal User Interfaces 4(1), 3–10 (2010)
D. Florencio, C. Herley, A large-scale study of web password habits, in Proceedings of the 16th International Conference on World Wide Web (WWW) (ACM, New York, 2007), pp. 657–666
M. Frank, R. Biedert, E. Ma, I. Martinovic, D. Song, Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 8(1), 136–148 (2013)
J.E. Gaffney, J.W. Ulvila, Evaluation of intrusion detectors: a decision theory approach, in Proceedings of the 2001 IEEE Symposium on Security and Privacy (2001), pp. 50–61
M. Goel, J.O. Wobbrock, S.N. Patel, GripSense: using built-in sensors to detect hand posture and pressure on commodity mobile phones, in Proceedings of the 25th Annual ACM symposium on User Interface Software and Technology (UIST) (ACM, New York, 2012), pp. 545–554
N.Z. Gong, R. Moazzezi, M. Payer, M. Frank, Forgery-resistant touch-based authentication on mobile devices, in Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (2016), pp. 499–510
G. Gu, P. Fogla, W. Lee, B. Skoric, Measuring intrusion detection capability: an information-theoretic approach, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS) (ACM, New York, 2006), pp. 90–101
N. Gunson, D. Marshall, F. McInnes, M. Jack, Usability evaluation of voiceprint authentication in automated telephone banking: sentences versus digits. Interacting Comput. 23(1), 57–69 (2011)
IDC. With Expectations of a Positive Second Half of 2018 and Beyond. https://www.idc.com/getdoc.jsp?containerId=prUS44240118.
A.K. Karlson, A.B. Brush, S. Schechter, Can i borrow your phone?: understanding concerns when sharing mobile phones, in Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI) (ACM, New York, 2009), pp. 1647–1650
M. Keith, B. Shao, P. Steinbart, The usability of passphrases for authentication: an empirical field study. Int. J. Hum. Comput. Stud. 65(1), 17–28 (2007)
D. Kim, P. Dunphy, P. Briggs, J. Hook, J.W. Nicholson, J. Nicholson, P. Olivier, Multi-touch authentication on tabletops, in Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI) (ACM, New York, 2010), pp. 1093–1102
L. Kotthoff, I.P. Gent, I. Miguel, An evaluation of machine learning in algorithm selection for search problems. AI Commun. 25(3), 257–270 (2012)
R. Lemos, Passwords: the weakest link? hackers can crack most in less than a minute (2002) http://news.com/2009-1001-916719.html
J. Li, J. Li, X. Chen, C. Jia, W. Lou, Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Commun. 64(2), 425–437 (2015)
J. Li, Z. Liu, X. Chen, F. Xhafa, X. Tan, D.S. Wong, L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18–26 (2015)
J. Li, H. Yan, Z. Liu, X. Chen, X. Huang, D.S. Wong, Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst. J. 11(2), 439–448 (2017)
J. Li, Y. Zhang, X. Chen, Y. Xiang, Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)
D. Maio, D. Maltoni, J.L. Wayman, A.K. Jain, Fvc2000: fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 402–412 (2002)
Y. Meng, Measuring intelligent false alarm reduction using an ROC curve-based approach in network intrusion detection, in Proceedings of the 2012 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) (2012), pp. 108–113
Y. Meng, L.F. Kwok, Adaptive false alarm filter using machine learning in intrusion detection, in Proceedings of the 6th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Advances in Intelligent and Soft Computing (Springer, Berlin, 2011), pp. 573–584
Y. Meng, D.S. Wong, R. Schlegel, L.F. Kwok, Touch gestures based biometric authentication scheme for touchscreen mobile phones, in Proceedings of the 8th China International Conference on Information Security and Cryptology (INSCRYPT). Lecture Notes in Computer Science (Springer, Heidelberg, 2012), pp. 331–350
Y. Meng, D.S. Wong, L.-F. Kwok, Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones, in Proceedings of the ACM Symposium on Applied Computing (2014), pp. 1680–1687
W. Meng, D.S. Wong, S. Furnell, J. Zhou, Surveying the development of biometric user authentication on mobile phones. IEEE Commun. Surv. Tutorials 17(3), 1268–1293 (2015)
W. Meng, Evaluating the effect of multi-touch behaviours on Android unlock patterns. Int. J. Inf. Comput. Secur. 24(3), 277–287 (2016)
W. Meng, W. Li, D.S. Wong, J. Zhou, TMGuard: a touch movement-based security mechanism for screen unlock patterns on smartphones, in Proceedings of the 14th International Conference on Applied Cryptography and Network Security (ACNS) (2016), pp. 629–647
W. Meng, W. Li, L. Jiang, L. Meng, On multiple password interference of touch screen patterns and text passwords, in Proceedings of ACM Conference on Human Factors in Computing Systems (2016), pp. 4818–4822
W. Meng, W.H. Lee, S.R. Murali, S.P.T. Krishnan, JuiceCaster: towards automatic juice filming attacks on smartphones. J. Netw. Comput. Appl. 68, 201–212 (2016)
W. Meng, W. Li, L.-F. Kwok, K.-K.R. Choo, Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65, 213–229 (2017)
W. Meng, L. Jiang, Y. Wang, J. Li, J. Zhang, Y. Xiang, JFCGuard: detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76, 252–264 (2018)
W. Meng, W. Li, D.S. Wong, Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones. Multimed. Tools Appl. 77(23), 30167–30185 (2018)
W. Meng, Z. Liu, TMGMap: designing touch movement-based geographical password authentication on smartphones, in The 14th International Conference on Information Security Practice and Experience (ISPEC 2018) (2018), pp. 373–390
Millennial Media. Mobile mix: The mobile device index (2012). Available at: http://www.millennialmedia.com/research
Mobile and NCSA. Report on Consumer Behaviors and Perceptions of Mobile Security (2012). Available at: http://docs.nq.com/NQ_Mobile_Security_Survey_Jan2012.pdf
T.V. Nguyen, N. Sae-Bae, N. Memon, DRAW-A-PIN: authentication using finger-drawn PIN on touch devices. Comput. Secur. 66, 115–128 (2017)
Y. Numabe, H. Nonaka, T. Yoshikawa, Finger Identification for touch panel operation using tapping fluctuation, in Proceedings of the IEEE 13th International Symposium on Consumer Electronics (2009), pp. 899–902
S. Pokharel, K.K.R. Choo, J. Liu, Mobile cloud security: an adversary model for lightweight browser security. Comput. Stand. Interfaces 49, 71–78 (2017)
R. Potharaju, A. Newell, C. Nita-Rotaru, X. Zhang, Plagiarizing smartphone applications: attack strategies and defense techniques, in Proceedings of the 2012 International Symposium on Engineering Secure Software and Systems (ESSoS). Lecture Notes in Computer Science (Springer, Heidelberg, 2012), pp. 106–120
M. Pusara, C.E. Brodley, User Re-authentication via mouse movements, in Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) (ACM, New York, USA, 2004), pp. 1–8
D. Quick, K.K.R. Choo, Pervasive social networking forensics: intelligence and evidence from mobile device extracts. J. Netw. Comput. Appl. 86, 24–33 (2017)
J. Ranjan, K. Whitehouse, Automatic authentication of smartphone touch interactions using smartwatch, in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (2016), pp. 361–364
N. Sae-Bae, N. Memon, K. Isbister, K. Ahmed, Multitouch gesture-based authentication. IEEE Trans. Inf. Forensics Secur. 9(4), 568–582 (2014)
H. Saevanee, P. Bhattarakosol, Authenticating user using keystroke dynamics and finger pressure, in Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference (CCNC) (IEEE, Piscataway, 2009), pp. 1078–1079
F. Schaub, R. Deyhle, M. Weber, Password entry usability and shoulder surfing susceptibility on different smartphone platforms, in Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia (MUM) (ACM, New York, 2012), pp. 1–10
N.A. Schmid, M.V. Ketkar, H. Singh, B. Cukic, Performance analysis of iris-based identification system at the matching score level. IEEE Trans. Inf. Forensics Secur. 1(2), 154–168 (2006)
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35–44 (2010)
M. Shahzad, A.X. Liu, A. Samuel, Behavior based human authentication on touch screen devices using gestures and signatures. IEEE Trans. Mob. Comput. 16(10), 2726–2741 (2017)
V. Sharma, R. Enbody, User authentication and identification from user interface interactions on touch-enabled devices, in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (2017), pp. 1–11
M. Smith-Creasey, M. Rajarajan, A continuous user authentication scheme for mobile devices, in Proceedings of the 14th Annual Conference on Privacy, Security and Trust (PST) (2016), pp. 104–113
R. Sommer, V. Paxson, Outside the closed world: on using machine learning for network intrusion detection, in Proceedings of the 2010 IEEE symposium on Security and Privacy (2010), pp. 305–316
Y. Song, Z. Cai, Z.-L. Zhang, Multi-touch authentication using hand geometry and behavioral information, in Proceedings of IEEE Symposium on Security and Privacy (2017), pp. 357–372
F. Tari, A.A. Ozok, S.H. Holden, A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords, in Proceedings of the 2nd Symposium on Usable Privacy and Security (SOUPS)(ACM, New York, 2006), pp. 56–66
M. Temper, S. Tjoa, M. Kaiser, Touch to authenticate—continuous biometric authentication on mobile devices, in Proceedings of the 2015 International Conference on Software Security and Assurance (ICSSA) (2015), pp. 30–35
The University of Waikato. WEKA-Waikato Environment for Knowledge Analysis. Available at: http://www.cs.waikato.ac.nz/ml/weka/
P.S. The, N. Zhang, A.B.J. Teoh, K. Chen, Recognizing your touch: towards strengthening mobile device authentication via touch dynamics integration, in Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM) (2015), pp. 108–116
S. Trewin, C. Swart, L. Koved, J. Martino, K. Singh, S. Ben-David, Biometric authentication on a mobile device: a study of user effort, error and task disruption, in Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC) (2012), pp. 159–168
D. Van Thanh, Security issues in mobile eCommerce, in Proceedings of the 11th International Workshop on Database and Expert Systems Applications (DEXA) (IEEE, Piscataway, 2000), pp. 412–425
R. Wallace, M. McLaren, C. McCool, S. Marcel, Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models. IEEE Trans. Inf. Forensics Secur. 7(2), 553–562 (2012)
D. Wang, H. Cheng, P. Wang, X. Huang, G. Jian, Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 12(11), 277–2791 (2017)
J. Yan, A. Blackwell, R. Anderson, A. Grant, Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25–31 (2004)
S. Zahid, M. Shahzad, S.A. Khayam, M. Farooq, Keystroke-based user identification on smart phones, in Proceedings of Recent Advances in Intrusion Detection. Lecture Notes in Computer Science (Springer, Berlin, 2009), pp. 224–243
X. Zhao, T. Feng, W. Shi, I.A. Kakadiaris, Mobile user authentication using statistical touch dynamics images. IEEE Trans. Inf. Forensics Secur. 9(11), 1780–1789 (2014)
N. Zheng, K. Bai, H. Huang, H. Wang, You are how you touch: user verification on smartphones via tapping behaviors, in Proceedings of the 2014 International Conference on Network Protocols (ICNP) (2014), pp. 221–232
Acknowledgement
The authors would like to thank all participants for their work in the user study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, Z., Meng, W., Li, W., Wong, D.S. (2020). Developing Cloud-Based Intelligent Touch Behavioral Authentication on Mobile Phones. In: Jiang, R., Li, CT., Crookes, D., Meng, W., Rosenberger, C. (eds) Deep Biometrics. Unsupervised and Semi-Supervised Learning. Springer, Cham. https://doi.org/10.1007/978-3-030-32583-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-32583-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32582-4
Online ISBN: 978-3-030-32583-1
eBook Packages: EngineeringEngineering (R0)