Next Article in Journal
Multi-Sensor Registration in High-Precision CMM Based on a Composite Standard
Next Article in Special Issue
PCPA: A Practical Certificateless Conditional Privacy Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Previous Article in Journal
Detection of Ultrasonic Stress Waves in Structures Using 3D Shaped Optic Fiber Based on a Mach–Zehnder Interferometer
Previous Article in Special Issue
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessArticle
Sensors 2018, 18(4), 1219; https://doi.org/10.3390/s18041219

Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors

Computer Security Lab (COSEC), Universidad Carlos III de Madrid, ES-28911 Madrid, Spain
*
Author to whom correspondence should be addressed.
Received: 26 February 2018 / Revised: 5 April 2018 / Accepted: 11 April 2018 / Published: 16 April 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
Full-Text   |   PDF [904 KB, uploaded 3 May 2018]   |  

Abstract

Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices. View Full-Text
Keywords: user-in-a-context continuous authentication; smartphone data; data stream mining; non-assisted sensors user-in-a-context continuous authentication; smartphone data; data stream mining; non-assisted sensors
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

de Fuentes, J.M.; Gonzalez-Manzano, L.; Ribagorda, A. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 2018, 18, 1219.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top