The authentication method for unlocking screens is an essential security feature of smartphones to avoid unauthorized access. Various mechanisms have been integrated into smartphones to authenticate users to reduce privacy infringement. Contextual awareness is now a key requirement for mobile computing to make intelligent decisions and provide an adaptable and convenient authentication model. Therefore, in this paper, a context-aware authentication system based on a machine learning technique is proposed. The proposed system takes the user’s body postures, location, SMS contents, and ambient environmental conditions as context. To enhance privacy protection, these context factors are selected to guide the authentication process and enable the authentication system to understand users and their surrounding environment. However, to provide the most appropriate authentication method, a machine learning model is designed. The model is trained and tested with the user’s context datasets. An appropriate dataset for the machine learning model is generated, and features that affect end-user interaction during the authentication process are identified. A total of 25 responses from smartphone owners were collected to evaluate the proposed system. After conducting a sentiment analysis, we found that 72 percent of users have a positive sentiment regarding the proposed system, which means that context-aware technology helps improve authentication adaptability and provides a convenient authentication method. The performance of the model was tested, and the results show that the proposed model effectively achieves a Mean Absolute Error (MAE) of 1.299, a Root Mean Square Error (RMSE) of 1.437, and an R Square of 76.78. Therefore, the system can improve the reliability and adaptability of the authentication process.
{"title":"An Adaptive Context-Aware Authentication System on Smartphones Using Machine Learning","authors":"Aiman M. Ayyal Awwad","doi":"10.18280/ijsse.130514","DOIUrl":"https://doi.org/10.18280/ijsse.130514","url":null,"abstract":"The authentication method for unlocking screens is an essential security feature of smartphones to avoid unauthorized access. Various mechanisms have been integrated into smartphones to authenticate users to reduce privacy infringement. Contextual awareness is now a key requirement for mobile computing to make intelligent decisions and provide an adaptable and convenient authentication model. Therefore, in this paper, a context-aware authentication system based on a machine learning technique is proposed. The proposed system takes the user’s body postures, location, SMS contents, and ambient environmental conditions as context. To enhance privacy protection, these context factors are selected to guide the authentication process and enable the authentication system to understand users and their surrounding environment. However, to provide the most appropriate authentication method, a machine learning model is designed. The model is trained and tested with the user’s context datasets. An appropriate dataset for the machine learning model is generated, and features that affect end-user interaction during the authentication process are identified. A total of 25 responses from smartphone owners were collected to evaluate the proposed system. After conducting a sentiment analysis, we found that 72 percent of users have a positive sentiment regarding the proposed system, which means that context-aware technology helps improve authentication adaptability and provides a convenient authentication method. The performance of the model was tested, and the results show that the proposed model effectively achieves a Mean Absolute Error (MAE) of 1.299, a Root Mean Square Error (RMSE) of 1.437, and an R Square of 76.78. Therefore, the system can improve the reliability and adaptability of the authentication process.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"112 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bibliometric Analysis of Electric Vehicle Adoption Research: Trends, Implications, and Future Directions","authors":"Edi Purwanto, Agustinus Purna Irawan","doi":"10.18280/ijsse.130503","DOIUrl":"https://doi.org/10.18280/ijsse.130503","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"114 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing IoT Security with Trust-Based Mechanism for Mitigating Black Hole Attacks","authors":"Mahalakshmi Govindaraj, Suresh Arumugam","doi":"10.18280/ijsse.130515","DOIUrl":"https://doi.org/10.18280/ijsse.130515","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"112 45","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marina Vladimirovna Grafkina, Evgeniya Yurevna Sviridova, Elena Viktorovna Goryacheva
ABSTRACT
{"title":"Reducing Occupational Risks in Industrial Processes: Analysis and Recommendations for Improving Safety in Production Equipment and Facilities","authors":"Marina Vladimirovna Grafkina, Evgeniya Yurevna Sviridova, Elena Viktorovna Goryacheva","doi":"10.18280/ijsse.130502","DOIUrl":"https://doi.org/10.18280/ijsse.130502","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"114 33","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hery Leo Sianturi, Adi Susilo, Juliany N. Mohamad, Redi K. Pingak
ABSTRACT
{"title":"Analysis of Landslide Using Resistivity Method in the Avalanche Area of Tolnaku, Kupang Regency, East Nusa Tenggara, Indonesia","authors":"Hery Leo Sianturi, Adi Susilo, Juliany N. Mohamad, Redi K. Pingak","doi":"10.18280/ijsse.130516","DOIUrl":"https://doi.org/10.18280/ijsse.130516","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"114 44","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joanie B. Houinsou, Kokou M. Assogba, Roland C. Houessouvo
ABSTRACT
{"title":"Identification of Human Survivors in Natural Disasters Through Body Odor Analysis","authors":"Joanie B. Houinsou, Kokou M. Assogba, Roland C. Houessouvo","doi":"10.18280/ijsse.130508","DOIUrl":"https://doi.org/10.18280/ijsse.130508","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"92 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135092065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Erni Suharini, None Supriyadi, Mohammad Syifauddin, Ervando Tommy Al-Hanif, Edi Kurniawan, Satya Budi Nugraha
ABSTRACT
{"title":"An Evaluation of Community Adoption of the InaRISK BNPB Platform for Disaster Management: An Application of the Technology Acceptance Model (TAM)","authors":"Erni Suharini, None Supriyadi, Mohammad Syifauddin, Ervando Tommy Al-Hanif, Edi Kurniawan, Satya Budi Nugraha","doi":"10.18280/ijsse.130409","DOIUrl":"https://doi.org/10.18280/ijsse.130409","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capitalizing on Blockchain Technology for Efficient Crowdfunding: An Exploration of Ethereum's Smart Contracts","authors":"Cynthia Jayapal, Arputha Rathina Xavier, Poonguzhali Arunachalam","doi":"10.18280/ijsse.130415","DOIUrl":"https://doi.org/10.18280/ijsse.130415","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135386730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing A Seismic Sensor-Driven Disaster Management System for Efficient Tsunami Early Warnings in the Arabian Peninsula","authors":"Minu Theresa Mathew, Zeyad Ismail","doi":"10.18280/ijsse.130416","DOIUrl":"https://doi.org/10.18280/ijsse.130416","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135387686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}