EchoIA: Implicit Authentication System Based on User Feedback

06/13/2020
by   Yingyuan Yang, et al.
0

Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sampled from various sensors. Identifying the illegitimate user through constantly analyzing current users' behavior, IA adds another layer of protection to the smart device. Due to the diversity of human behavior, the existing research works tend to simultaneously utilize many different features to identify users, which is less efficient. Irrelevant features may increase system delay and reduce the authentication accuracy. However, dynamically choosing the best suitable features for each user (personal features) requires a massive calculation, especially in the real environment. In this paper, we proposed EchoIA to find personal features with a small amount of calculation by utilizing user feedback. In the authentication phase, our approach maintains the transparency, which is the major advantage of IA. In the past two years, we conducted a comprehensive experiment to evaluate EchoIA. We compared it with other state-of-the-art IA schemes in the aspect of authentication accuracy and efficiency. The experiment results show that EchoIA has better authentication accuracy (93%) and less energy consumption (23-hour battery lifetimes) than other IA schemes.

READ FULL TEXT
research
06/15/2020

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Implicit authentication (IA) is gaining popularity over recent years due...
research
08/02/2018

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Implicit authentication (IA) is gaining popularity over recent years due...
research
07/15/2019

Summary: Multi-modal Biometric-based Implicit Authentication of Wearable Device Users

The Internet of Things (IoT) is increasingly empowering people with an i...
research
09/06/2021

IoT Security and Authentication schemes Based on Machine Learning: Review

With the latest developments in technology, extra and extra human beings...
research
08/29/2023

Better Prefix Authentication

We present new schemes for solving prefix authentication and secure rela...
research
02/06/2023

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

Mobile applications are widely used for online services sharing a large ...
research
05/31/2018

Classifying Eyes-Free Mobile Authentication Techniques

Mobile device users avoiding observational attacks and coping with situa...

Please sign up or login with your details

Forgot password? Click here to reset