Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Information  /  Vol: 14 Par: 5 (2023)  /  Artículo
ARTÍCULO
TITULO

Continuous User Authentication on Multiple Smart Devices

Yajie Wang    
Xiaomei Zhang and Haomin Hu    

Resumen

Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been conducted to apply user authentication through behavioral biometrics. However, few of them consider continuous user authentication on multiple smart devices. In this paper, we investigate user authentication from a new perspective?continuous authentication on multi-devices, that is, continuously authenticating users after both initial access to one device and transfer to other devices. In contrast to previous studies, we propose a continuous user authentication method that exploits behavioral biometric identification on multiple smart devices. In this study, we consider the sensor data captured by accelerometer and gyroscope sensors on both smartphones and tablets. Furthermore, multi-device behavioral biometric data are utilized as the input of our optimized neural network model, which combines a convolutional neural network (CNN) and a long short-term memory (LSTM) network. In particular, we construct two-dimensional domain images to characterize the underlying features of sensor signals between different devices and then input them into our network for classification. In order to strengthen the effectiveness and efficiency of authentication on multiple devices, we introduce an adaptive confidence-based strategy by taking historical user authentication results into account. This paper evaluates the performance of our multi-device continuous user authentication mechanism under different scenarios, and extensive empirical results demonstrate its feasibility and efficiency. Using the mechanism, we achieved mean accuracies of 99.8% and 99.2% for smartphones and tablets, respectively, in approximately 2.3 s, which shows that it authenticates users accurately and quickly.

 Artículos similares

       
 
Eun-Seok Lee and Byeong-Seok Shin    
The extended reality (XR) environment demands high-performance computing and data processing capabilities, while requiring continuous technological development to enable a real-time integration between the physical and virtual worlds for user interaction... ver más
Revista: Applied Sciences

 
Abdel-Aziz Ahmad Sharabati, Shafig Al-Haddad, Mohammad Al-Khasawneh, Natalie Nababteh, Mai Mohammad and Qais Abu Ghoush    
People use social media not only for social purposes but also for business purposes. It is used in management and marketing as a tool to manage organizations and market products and services, especially to influence customers? intention and satisfaction.... ver más

 
Donghyun Youm and Jungyoon Kim    
The genre characteristics of RPG (role-playing game), which have high expectations for high sales and continuous profit generation, have created a phenomenon that has attracted many developers to become interested in the RPG market. However, recently, RP... ver más
Revista: Applied Sciences

 
Rafael Luiz da Silva, Boxuan Zhong, Yuhan Chen and Edgar Lobaton    
Body-rocking is an undesired stereotypical motor movement performed by some individuals, and its detection is essential for self-awareness and habit change. We envision a pipeline that includes inertial wearable sensors and a real-time detection system f... ver más
Revista: Information

 
Hsien-Ming Chou    
Existing caretakers of long-term care are assigned constrainedly and randomly to taking care of older people, which could lead to issues of shortage of manpower and poor human quality, especially the proportion of older people increases year after year t... ver más
Revista: Applied Sciences