To refer to this page use:
|Abstract:||Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the smartphone user based on behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We propose novel context-based authentication models to differentiate the legitimate smartphone owner versus other users. We systematically show how to achieve high authentication accuracy with different design alternatives in sensor and feature selection, machine learning techniques, context detection and multiple devices. Our system can achieve excellent authentication performance with 98.1% accuracy with negligible system overhead and less than 2.4% battery consumption.|
|Electronic Publication Date:||31-Aug-2017|
|Citation:||Lee, W-H, Lee, RB. (2017). Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. 297 - 308. doi:10.1109/DSN.2017.24|
|Pages:||297 - 308|
|Type of Material:||Conference Article|
|Journal/Proceeding Title:||Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks|
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.