Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017 (2017), Article ID 1367064, 14 pages
https://doi.org/10.1155/2017/1367064
Research Article

Leveraging Battery Usage from Mobile Devices for Active Authentication

imec-DistriNet, Department of Computer Science, KU Leuven, Leuven, Belgium

Correspondence should be addressed to Davy Preuveneers

Received 7 September 2016; Revised 16 January 2017; Accepted 14 February 2017; Published 12 March 2017

Academic Editor: Daniele Riboni

Copyright © 2017 Jan Spooren et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Dasgupta, A. Roy, and A. Nag, “Toward the design of adaptive selection strategies for multi-factor authentication,” Computers & Security, vol. 63, pp. 85–116, 2016. View at Publisher · View at Google Scholar
  2. C. Militello, V. Conti, F. Sorbello, and S. Vitabile, “A fast fusion technique for finger-print and iris spatial descriptors in multimodal biometric systems,” Computer Systems Science and Engineering, vol. 29, no. 3, pp. 205–217, 2014. View at Google Scholar · View at Scopus
  3. T. Heyman, D. Preuveneers, and W. Joosen, “Scalability analysis of the OpenAM access control system with the universal scalability law,” in Proceedings of the 2nd International Conference on Future Internet of Things and Cloud (FiCloud '14), pp. 505–512, Barcelona, Spain, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. E. Hayashi, S. Das, S. Amini, J. Hong, and I. Oakley, “CASA: context-aware scalable authentication,” in Proceedings of the 9th Symposium on Usable Privacy and Security (SOUPS '13), pp. 3:1–3:10, ACM, Newcastle, UK, July 2013. View at Publisher · View at Google Scholar
  5. S. J. Shepherd, “Continuous authentication by analysis of keyboard typing characteristics,” in Proceedings of the European Convention on Security and Detection, pp. 111–114, May 1995. View at Scopus
  6. E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior,” in Proceedings of the 13th International Conference on Information Security (ISC '10), pp. 99–113, Springer, Berlin, Germany, 2011, http://dl.acm.org/citation.cfm?id=1949317.1949329.
  7. R. Crossler, A. Johnston, P. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Computers and Security, vol. 32, pp. 90–101, 2013. View at Publisher · View at Google Scholar
  8. H. G. Kayacik, M. Just, L. Baillie, D. Aspinall, and N. Micallef, “Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors,” https://arxiv.org/abs/1410.7743.
  9. Y. Lindell and B. Pinkas, “Secure multiparty computation for privacy-preserving data mining,” IACR Cryptology ePrint Archive 2008/197, 2008, http://eprint.iacr.org/2008/197. View at Google Scholar
  10. D. Mittal, D. Kaur, and A. Aggarwal, “Secure data mining in cloud using homomorphic encryption,” in Proceedings of the IEEE International Conference on Cloud Computing in Emerging Markets (CCEM '14), pp. 1–7, IEEE, Bangalore, India, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Jakobsson, E. Shi, P. Golle, and R. Chow, “Implicit authentication for mobile devices,” in Proceedings of the 4th USENIX Conference on Hot Topics in Security (HotSec '09), p. 9, USENIX Association, Berkeley, Calif, USA, 2009, http://dl.acm.org/citation.cfm?id=1855628.1855637.
  12. O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, “Progressive authentication: deciding when to authenticate on mobile phones,” in Proceedings of the 21st USENIX Security Symposium (USENIX Security '12), pp. 301–316, USENIX, Bellevue, Wash, USA, 2012, https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/riva.
  13. L. Fridman, S. Weber, R. Greenstadt, and M. Kam, “Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location,” IEEE Systems Journal, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Li, N. Clarke, M. Papadaki, and P. Dowland, “Active authentication for mobile devices utilising behaviour profiling,” International Journal of Information Security, vol. 13, no. 3, pp. 229–244, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Imbert, “Beyond the cookie: using network traffic characteristics to enhance confidence in user identity,” 2014, http://software-security.sans.org/resources/paper/reading-room/cookie-network-traffic-characteristics-enhance-confidence-user-identity/.
  16. M. Antal, L. Z. Szabo, and I. Laszlo, “Keystroke dynamics on android platform,” in Proceedings of the 8th International Conference Interdisciplinarity in Engineering (INTER-ENG '14), vol. 19, pp. 820–826, Tirgu Mures, Romania, October 2014, http://www.sciencedirect.com/science/article/pii/S221201731500119X.
  17. Y. Deng and Y. Zhong, “Keystroke dynamics user authentication based on Gaussian mixture model and deep belief nets,” ISRN Signal Processing, vol. 2013, Article ID 565183, 7 pages, 2013. View at Publisher · View at Google Scholar
  18. J. Wu and Z. Chen, “An implicit identity authentication system considering changes of gesture based on keystroke behaviors,” International Journal of Distributed Sensor Networks, vol. 11, no. 5, 2015, http://journals.sagepub.com/doi/abs/10.1155/2015/470274. View at Google Scholar
  19. P. S. Teh, A. B. J. Teoh, and S. Yue, “A survey of keystroke dynamics biometrics,” The Scientific World Journal, vol. 2013, Article ID 408280, 24 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. N. Karapanos, C. Marforio, C. Soriente, and S. Capkun, “Sound-proof: usable two-factor authentication based on ambient sound,” in Proceedings of the 24th USENIX Security Symposium (USENIX Security '15), pp. 483–498, USENIX Association, Washington, DC, USA, August 2015, https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos.
  21. A. Kale, N. Cuntoor, B. Yegnanarayana, A. N. Rajagopalan, and R. Chellappa, “Gait analysis for human identification,” in Audio- and Video-Based Biometric Person Authentication: 4th International Conference, AVBPA 2003 Guildford, UK, June 9–11, 2003 Proceedings, vol. 2688 of Lecture Notes in Computer Science, pp. 706–714, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  22. C. Ntantogian, S. Malliaros, and C. Xenakis, “Gaithashing: a two-factor authentication scheme based on gait features,” Computers and Security, vol. 52, pp. 17–32, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. A. J. Oliner, A. P. Iyer, I. Stoica, E. Lagerspetz, and S. Tarkoma, “Carat: collaborative energy diagnosis for mobile devices,” in Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13), pp. 10:1–10:14, Roma, Italy, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. E. Peltonen, E. Lagerspetz, P. Nurmi, and S. Tarkoma, “Energy modeling of system settings: a crowdsourced approach,” in Proceedings of the 13th IEEE International Conference on Pervasive Computing and Communications (PerCom '15), pp. 37–45, IEEE, St. Louis, Mo, USA, March 2015. View at Publisher · View at Google Scholar · View at Scopus
  25. D. T. Wagner, A. Rice, and A. R. Beresford, “Device analyzer: large-scale mobile data collection,” ACM SIGMETRICS Performance Evaluation Review, vol. 41, no. 4, pp. 53–56, 2014. View at Publisher · View at Google Scholar
  26. J. Spooren, D. Preuveneers, and W. Joosen, “Mobile device fingerprinting considered harmful for risk-based authentication,” in Proceedings of the 8th European Workshop on System Security (EuroSec '15), pp. 6:1–6:6, Bordeaux, France, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, “Online risk-based authentication using behavioral biometrics,” Multimedia Tools and Applications, vol. 71, no. 2, pp. 575–605, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. S. P. Banerjee and D. Woodard, “Biometric authentication and identification using keystroke dynamics: a survey,” Journal of Pattern Recognition Research, vol. 7, no. 1, pp. 116–139, 2012. View at Publisher · View at Google Scholar
  29. C.-L. Liu, C.-J. Tsai, T.-Y. Chang, W.-J. Tsai, and P.-K. Zhong, “Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone,” Journal of Network and Computer Applications, vol. 53, pp. 128–139, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 136–148, 2013. View at Publisher · View at Google Scholar
  31. P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “A survey on touch dynamics authentication in mobile devices,” Computers and Security, vol. 59, pp. 210–235, 2016. View at Publisher · View at Google Scholar · View at Scopus
  32. R. V. Yampolskiy and V. Govindaraju, “Behavioural biometrics: a survey and classification,” International Journal of Biometrics, vol. 1, no. 1, pp. 81–113, 2008. View at Publisher · View at Google Scholar · View at Scopus
  33. H. Witte, C. Rathgeb, and C. Busch, “Context-aware mobile biometric authentication based on support vector machines,” in Proceedings of the 4th International Conference on Emerging Security Technologies (EST '13), pp. 29–32, September 2013. View at Publisher · View at Google Scholar · View at Scopus
  34. Z. Chair and P. K. Varshney, “Optimal data fusion in multiple sensor detection systems,” IEEE Transactions on Aerospace and Electronic Systems, vol. 22, no. 1, pp. 98–101, 1986. View at Publisher · View at Google Scholar · View at Scopus
  35. A. Fridman, A. Stolerman, S. Acharya et al., “Decision fusion for multimodal active authentication,” IT Professional, vol. 15, no. 4, pp. 29–33, 2013. View at Publisher · View at Google Scholar · View at Scopus
  36. K. O. Bailey, J. S. Okolica, and G. L. Peterson, “User identification and authentication using multi-modal behavioral biometrics,” Computers and Security, vol. 43, pp. 77–89, 2014. View at Publisher · View at Google Scholar · View at Scopus
  37. D. Preuveneers and W. Joosen, “SmartAuth: dynamic context fingerprinting for continuous user authentication,” in Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC '15), pp. 2185–2191, Salamanca, Spain, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. L. Olejnik, G. Acar, C. Castelluccia, and C. Diaz, “The leaking battery: a privacy analysis of the html5 battery status api,” Report 2015/616, Cryptology ePrint Archive, 2015, http://eprint.iacr.org/. View at Google Scholar
  39. P. Eckersley, “How unique is your web browser?” in Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, July 21–23, 2010. Proceedings, vol. 6205 of Lecture Notes in Computer Science, pp. 1–18, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar