TY - GEN
T1 - Securing highly-sensitive information in smart mobile devices through difficult-to-mimic and single-time usage analytics
AU - Sarmin, Saiyma
AU - Anzum, Nafisa
AU - Zubaer, Kazi Hasan
AU - Rahman, Farzana
AU - Al Islam, A. B.M.Alim
N1 - Publisher Copyright:
© 2018 Association for Computing Machinery.
PY - 2018/11/5
Y1 - 2018/11/5
N2 - The ability of smart devices to recognize their owners or valid users gains attention with the advent of widespread highly sensitive usage of these devices such as storing secret and personal information. Unlike the existing techniques, in this paper, we propose a very lightweight single-time user identification technique that can ensure a unique authentication by presenting a system near-to-impossible to breach for intruders. Here, we have conducted a thorough study over single-time usage data collected from 33 users. The study reveals several new findings, which in turn, leads us to a novel solution exploiting a new machine learning technique. Our evaluation confirms that the proposed solution operates with only 5% False Acceptance Rate (FAR) and only 6% False Rejection Rate (FRR) over the data collected from 33 users. We further evaluate the performance through comparing its performance with some existing machine learning techniques. Finally, we perform a real implementation of our proposed solution as a mobile application to conduct a rigorous user evaluation over 27 participants using three different devices in order to show how the solution works in practical situations. Outcomes of the user evaluation demonstrate as low as 0% FAR after letting intruders to mimic the actual user, which ensures extremely low probability of being breached. Moreover, we let 2 users to continuously use our application over 25 days in different states during their operation. Outcomes of this evaluation demonstrate as low as 1% FRR confirming the usability of our technique in long-term usage.
AB - The ability of smart devices to recognize their owners or valid users gains attention with the advent of widespread highly sensitive usage of these devices such as storing secret and personal information. Unlike the existing techniques, in this paper, we propose a very lightweight single-time user identification technique that can ensure a unique authentication by presenting a system near-to-impossible to breach for intruders. Here, we have conducted a thorough study over single-time usage data collected from 33 users. The study reveals several new findings, which in turn, leads us to a novel solution exploiting a new machine learning technique. Our evaluation confirms that the proposed solution operates with only 5% False Acceptance Rate (FAR) and only 6% False Rejection Rate (FRR) over the data collected from 33 users. We further evaluate the performance through comparing its performance with some existing machine learning techniques. Finally, we perform a real implementation of our proposed solution as a mobile application to conduct a rigorous user evaluation over 27 participants using three different devices in order to show how the solution works in practical situations. Outcomes of the user evaluation demonstrate as low as 0% FAR after letting intruders to mimic the actual user, which ensures extremely low probability of being breached. Moreover, we let 2 users to continuously use our application over 25 days in different states during their operation. Outcomes of this evaluation demonstrate as low as 1% FRR confirming the usability of our technique in long-term usage.
KW - Behavioral biometrics
KW - Mean-SD clustering
KW - Security
KW - Smartphone
UR - http://www.scopus.com/inward/record.url?scp=85060020005&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85060020005&partnerID=8YFLogxK
U2 - 10.1145/3286978.3287012
DO - 10.1145/3286978.3287012
M3 - Conference contribution
AN - SCOPUS:85060020005
T3 - ACM International Conference Proceeding Series
SP - 322
EP - 331
BT - Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems
PB - Association for Computing Machinery
T2 - 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018
Y2 - 5 November 2018 through 7 November 2018
ER -