Yijing Chen , Gang Liu , Lin Yu , Hongzhaoning Kang , Lei Meng , Tao Wang
{"title":"TBAuth:基于智能手机点击行为的连续认证框架","authors":"Yijing Chen , Gang Liu , Lin Yu , Hongzhaoning Kang , Lei Meng , Tao Wang","doi":"10.1016/j.eswa.2024.125811","DOIUrl":null,"url":null,"abstract":"<div><div>With the widespread adoption of smartphones, the security risks associated by the single authentication scheme have become increasingly serious. This promptes researchers to shift focus towards continuous authentication(CA) techniques. tap is a kind of behavior that can reflect the user’s identity. In this paper, a CA framework based on tap behavior (TBAuth) is proposed, which utilizes a vibration model to model tap behavior. In order to fully explore the potential of tap behavior, we analyze the user identity information embedded in it and its correlation with vibration. The data from motion sensors and touchscreen sensors are combined to fully extract tap behavioral features, and a feature selection method is proposed. In addition, a single classifier local outlier factor (LOF) is used to train authentication model. We validate TBAuth using a dataset of tap behavior collected from 40 volunteers. Extensive experiments are conducted, including method evaluation, authentication performance evaluation, and simulation experiments. The experimental results demonstrate that excellent user identity verification performance is achieved by TBAuth, as it can achieve an authentication performance as low as a 2.95% equal error rate (EER).</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"264 ","pages":"Article 125811"},"PeriodicalIF":7.5000,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TBAuth: A continuous authentication framework based on tap behavior for smartphones\",\"authors\":\"Yijing Chen , Gang Liu , Lin Yu , Hongzhaoning Kang , Lei Meng , Tao Wang\",\"doi\":\"10.1016/j.eswa.2024.125811\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the widespread adoption of smartphones, the security risks associated by the single authentication scheme have become increasingly serious. This promptes researchers to shift focus towards continuous authentication(CA) techniques. tap is a kind of behavior that can reflect the user’s identity. In this paper, a CA framework based on tap behavior (TBAuth) is proposed, which utilizes a vibration model to model tap behavior. In order to fully explore the potential of tap behavior, we analyze the user identity information embedded in it and its correlation with vibration. The data from motion sensors and touchscreen sensors are combined to fully extract tap behavioral features, and a feature selection method is proposed. In addition, a single classifier local outlier factor (LOF) is used to train authentication model. We validate TBAuth using a dataset of tap behavior collected from 40 volunteers. Extensive experiments are conducted, including method evaluation, authentication performance evaluation, and simulation experiments. The experimental results demonstrate that excellent user identity verification performance is achieved by TBAuth, as it can achieve an authentication performance as low as a 2.95% equal error rate (EER).</div></div>\",\"PeriodicalId\":50461,\"journal\":{\"name\":\"Expert Systems with Applications\",\"volume\":\"264 \",\"pages\":\"Article 125811\"},\"PeriodicalIF\":7.5000,\"publicationDate\":\"2024-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Expert Systems with Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0957417424026782\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Expert Systems with Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0957417424026782","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
TBAuth: A continuous authentication framework based on tap behavior for smartphones
With the widespread adoption of smartphones, the security risks associated by the single authentication scheme have become increasingly serious. This promptes researchers to shift focus towards continuous authentication(CA) techniques. tap is a kind of behavior that can reflect the user’s identity. In this paper, a CA framework based on tap behavior (TBAuth) is proposed, which utilizes a vibration model to model tap behavior. In order to fully explore the potential of tap behavior, we analyze the user identity information embedded in it and its correlation with vibration. The data from motion sensors and touchscreen sensors are combined to fully extract tap behavioral features, and a feature selection method is proposed. In addition, a single classifier local outlier factor (LOF) is used to train authentication model. We validate TBAuth using a dataset of tap behavior collected from 40 volunteers. Extensive experiments are conducted, including method evaluation, authentication performance evaluation, and simulation experiments. The experimental results demonstrate that excellent user identity verification performance is achieved by TBAuth, as it can achieve an authentication performance as low as a 2.95% equal error rate (EER).
期刊介绍:
Expert Systems With Applications is an international journal dedicated to the exchange of information on expert and intelligent systems used globally in industry, government, and universities. The journal emphasizes original papers covering the design, development, testing, implementation, and management of these systems, offering practical guidelines. It spans various sectors such as finance, engineering, marketing, law, project management, information management, medicine, and more. The journal also welcomes papers on multi-agent systems, knowledge management, neural networks, knowledge discovery, data mining, and other related areas, excluding applications to military/defense systems.