Computer Science ›› 2020, Vol. 47 ›› Issue (11): 19-24.doi: 10.11896/jsjkx.200600004

Special Issue: Intelligent Mobile Authentication

• Intelligent Mobile Authentication • Previous Articles     Next Articles

Implicit Authentication Mechanism of Pattern Unlock Based on Over-sampling and One-class Classification for Smartphones

YAO Mu-yan, TAO Dan   

  1. School of Electronic and Information Engineering,Beijing Jiaotong University,Beijing 100044,China
  • Received:2020-06-01 Revised:2020-09-14 Online:2020-11-15 Published:2020-11-05
  • About author:YAO Mu-yan,born in 1998.His main research interests include big data analysis,privacy and security.
    TAO Dan,born in 1978,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation and a member of CCF TCIoT.Her main research interests include the IoT,mobile computing,wireless network,big data security and intelligent information processing.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61872027) and Open Research Fund of State Key Laboratory of Integrated Services Networks (ISN21-16).

Abstract: Nowadays,smartphones are widely used and stored with sensitive information,and the loss of any personal device can cause fatal information compromise.Thus,the people's attention towards data security has been elevated to a higher level.Considering the delicacy of traditional authentications,this paper investigates an implicit authentication mechanism based on over-sampling and one-class classification,for pattern unlock on smartphones.First,a fusion of time,two-dimensional and three-dimensional sensors is employed,to collect user behavioral biometrics comprehensively.Second,in order to ease the impact caused by noise contained in high-dimensional data,a feature screening,which is composed of feature selection and dimensional compression,is designed.Particularly,in view of the existing limitations of the current binary classification schemes,SVM SMOTE is used to over-sample the user behavioral data,and a one-class classification authentication mechanism is delivered to implement classification,of which the learning process is only based on a single-class diminutive training set.A series of experiments have been conducted on actual data,and results show that the proposed scheme,when only relies on a single-class diminutive training set,performs partially better than the traditional binomial KNN classifier which is trained on large-scale data,in terms of accuracy,FAR,FRR and AUC.

Key words: Diminutive training data set, Gesture pattern, Implicit authentication, One-class support vector machine, Over-sampling

CLC Number: 

  • TP391.4
[1] LEE M K.Security notions and advanced method for humanshoulder-surfing resistant PIN-entry [J].IEEE Transactions on Information Forensics and Security,2014,9(4):695-708.
[2] SCHNEEGASS S,STEIMLE F,BULLING A,et al.SmudgeSafe:geometric image transformations for smudge-resistant user authentication [C] //Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14).2014:775-786.
[3] HOANG T,NGUYEN T C,LUONG C,et al.Adaptive crossdevice gait recognition using a mobile accelerometer [J].Journalof Information Processing Systems,2013,9(2):333-348.
[4] SITOVAZ,SEDENKA J,YANG Q,et al.HMOG:new behavioral biometric features for continuous authentication of smartphone users [J].IEEE Transactions on Information Forensics and Security,2016,11(5):877-892.
[5] LIU L C,LI R G,YIN L H,et al.Research on multi-feature fusion impact authentication for intelligent mobile device[J].Acta Electronica Sinica,2016,44(11):2713-2719.
[6] KONGJ,GUO Y B,LIU C H,et al.Gait feature identification method based on motion sensor in smartphone[J].Journal of Computer Applications,2019,39(6):1747-1752.
[7] XIANG D D,CHEN H G,XIONG J J.Research on identity verification of mobile based on user behavior characteristics [J].Journal of Shanghai Normal University(Natural Sciences),2019,48(2):151-159.
[8] WANG R Z,TAO D.Context-aware implicit authentication of smartphone users based on multi-sensor behavior [J].IEEE Access,2019,7:119654-119667.
[9] YANG Y F,GUO B,WANG Z,et al.BehaveSense:Continuous authentication for security-sensitive mobile apps using behavioral biometrics [J].Ad Hoc Networks,2019,2019(84):9-18.
[10] SUN C,WANG Y,ZHENG J.Dissecting pattern unlock:Theeffect of pattern strength meter on pattern selection [J].Journal of Information Security and Applications,2014,19:4-5.
[11] SHI X P,WONG Y D,LI M Z,et al.A feature learning approach based on XGBoost for driving assessment and risk prediction [J].Accident Analysis & Prevention,2019,129:170-179.
[12] DONG M G,JIANG Z L,JING C.Multi-class imbalanced learning algorithm based on hellinger distance and smote algorithm[J].Computer Science,2020,47(1):102-109.
[13] LIU B Y.Smart phone identity authentication based on gesture recognition [D].Beijing:Beijing Jiaotong University,2018.
[1] JIANG Hao-chen, WEI Zi-qi, LIU Lin, CHEN Jun. Imbalanced Data Classification:A Survey and Experiments in Medical Domain [J]. Computer Science, 2022, 49(1): 80-88.
[2] WANG Li, CHEN Hong-mei. NKSMOTE Algorithm Based Classification Method for Imbalanced Dataset [J]. Computer Science, 2018, 45(9): 260-265.
[3] WANG Jin-wan, MAO Wen-tao, WANG Li-yun and HE Ling. Imbalanced Online Sequential Extreme Learning Machine Based on Principal Curve [J]. Computer Science, 2016, 43(3): 62-67.
[4] XU Jun-feng,DING Xue-feng,SI Cheng-xiang and ZHANG Wei. Certificateless Anonymous Authentication Protocol for Vehicle Ad-hoc Network [J]. Computer Science, 2013, 40(9): 152-155.
[5] . Secure Vehicle-to-Infrastructure Communication Protocol Based on Certificateless Cryptosystem [J]. Computer Science, 2012, 39(9): 20-23.
[6] . [J]. Computer Science, 2007, 34(9): 139-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!