Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(906.21KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Hassan Sbeyti
Pages - 120 - 139     |    Revised - 31-08-2016     |    Published - 01-10-2016
Volume - 10   Issue - 4    |    Publication Date - October 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Security, Implicit Authentication, Behavioral Modeling.
ABSTRACT
Smart devices are equipped with multiple authentication techniques and still remain prone to attacks since all of these techniques require explicit user intervention. The purpose of this paper is to capture the user behavior in order to use it as an implicit authentication technique.

In this paper, we introduce a novel authentication model to be used complementary to the existing models; Particularly, the context of the user, the duration of usage of each application and the occurrence time were examined and modeled using the cubic spline function as an authentication technique. A software system composed of two software components has been implemented on Android platform. Preliminary results show a 76% accuracy rate in determining the rightful owner of the device.
1 Google Scholar 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 Enisa.europa.eu."Top Ten Smartphone Risks ENISA. Internet: https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical-applications/smartphone-security-1/top-ten-risks, Oct. 25, 2000 [Nov. 24, 2015].
2 Clarke. "Furnell. Authenticating mobile phone users using keystroke analysis." International Journal of Information Security, vol. 6.1, pp. 1-14, 2007.
3 Saevanee, H., and P. Bhattarakosol. "Authenticating user using keystroke dynamics and finger pressure," in Proc. CCNC Consumer Communications and Networking Conference, 2009.
4 Wang, Yuan, Yunhong Wang, and Tieniu Tan. "Combining fingerprint and voiceprint biometrics for identity verification: an experimental comparison" in Book Biometric Authentication, Ed. Berlin Heidelberg: Springer, 2004, 663-670.
5 D.B. Sae-Bae, Napa, et al. "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in Proc. SIGCHI Conference on Human Factors in Computing Systems ACM, 2012, pp.
6 Yazji, Sausan. "Implicit user re-authentication for mobile devices," in Ubiquitous Intelligence and Computing, Berlin Heidelberg: Springer, 2009, pp. 325-339.
7 B. El-Hage. "Mobile user signature extraction based on user behavioral pattern." MSC thesis, Arab Open University - Faculty of Computer Studies, Lebanon, 2015.
8 H. Sbeyti, B. ElHajj, A. Fadlallah "Mobile user signature extraction based on user behavioral pattern(MUSEP)" International Journal of Pervasive Computing and Communications, Vol. 12, No. 4, October 2016.
9 Stober, Tim, et al. "Who do you sync you are?: smartphone fingerprinting via application behavior," in Proc. of the sixth ACM conference on Security and privacy in wireless and mobile networks. ACM, 2013.
10 Fischer, Ian Timothy, et al. "Short paper: Smartphones: Not smart enough?," in Proc. of the second ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2012.
11 Jakobsson, Shi, et al. "Implicit authentication for mobile devices," in Proc. of the 4th USENIX conference on Hot topics in . USENIX Association, 2009.
12 Zhu, Jiang, et al. "Mobile security through passive sensing," in Proc. of the Computing, Networking and Communications (ICNC). IEEE, 2013.
13 De Luca, Alexander, et al. "Touch me once and i know it's you!: implicit authentication based on touch screen patterns", in Proc. of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012.
14 Bo, Cheng, et al. "SilentSense: silent user identification via touch and movement behavioral biometrics," in Proc. of the 19th annual international conference on Mobile computing and networking. ACM, 2013.
15 Khan, Hassan, and Urs Hengartner. "Towards application-centric implicit authentication on smartphones," in Proc. of the 15th Workshop on Mobile Computing Systems and Applications. ACM, 2014.
16 Sae-Bae, Napa, et al. "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in Proc. of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012.
17 M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song. "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication." IEEE Transactions on Information Forensics and Security, vol. 8(1, pp. 136148, Jan. 2013.
18 Khan, Hassan, Aaron Atwater, and Urs Hengartner. "Itus: an implicit authentication framework for android," in Proc. of the 20th annual international conference on Mobile computing and networking. ACM, 2014.
19 Gafurov, Davrondzhon, Kirsi Helkala, and Torkjel SÞndrol. "Biometric gait authentication using accelerometer sensor." Journal of computers, vol. 1.7, pp. 51-59, 2006.
20 M, Jani, et al. "Identifying users of portable devices from gait pattern with accelerometers," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, 2005.
21 Monotonic cubic spline interpolation. In Computer Graphics International, 1999. Proceedings (pp. 188-195). IEEE.
22 McKinley, S. and Levine, M., (1998) Cubic Spline Interpolation. College of the Redwoods.
23 Klasson, K.T., (2008). Construction of spline functions in spreadsheets to smooth experimental data. Advances in Engineering Software, 39(5), pp.422-429.
24 H. Sbeyti, M. Malli, A. Fadlallah, K. Tahat, M. Youssef, " Scalable extensible Middleware framework for context-aware Mobile applications.", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Vol. 7.3, No. 3, September 2016.
25 H. Sbeyti et al. "Standardized Scalable Relocatable Context-Aware Middleware for Mobile Applications. Internet: www.scammp-project.info 2014 [June. 28, 2016].
26 Osgood, B., (2013). Lecture notes for EE 261: the Fourier transform and its applications. Stanford Engineering Everywhere.
27 Rao, K.R., Kim, D.N. and Hwang, J.J., (2011). Fast Fourier Transform-Algorithms and Applications. Springer Science & Business Media.
Dr. Hassan Sbeyti
Faculty of computer Studies, Arab Open Univeristy - Lebanon
hsbeity@aou.edu.lb