skip to main content
10.1145/3151848.3151853acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

One tap owner authentication on smartphones

Published: 04 December 2017 Publication History

Abstract

Mobile devices have become more versatile and thus more tied to the daily life. To protect various pieces of data stored in the device, owner authentication has become essential as the frontline of security. However, with increasing use of these devices, usability is increasingly considered more important in addition to security when designing the system. To meet this demand, touch dynamics authentication has been investigated, but the minimum number of taps required by existing systems is 4. This paper introduces a novel method that needs only a single tap to authenticate the user on his or her smartphone. By using only the internal sensors of smartphones, we achieved an average equal error rate (EER) of 3.8 with 10 owners and 25 unauthorized users.

References

[1]
Margit Antal, László Zsolt Szabó, and Izabella László. 2015. Keystroke dynamics on android platform. Procedia Technology 19 (2015), 820--826.
[2]
Noam Ben-Asher, Niklas Kirschnick, Hanul Sieger, Joachim Meyer, Asaf Ben-Oved, and Sebastian Möller. 2011. On the need for different security methods on mobile phones. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. ACM, 465--473.
[3]
Alexander De Luca, Alina Hang, Emanuel Von Zezschwitz, and Heinrich Hussmann. 2015. I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1411--1414.
[4]
Ignacio de Mendizabal-Vázquez, Daniel de Santos-Sierra, Javier Guerra-Casanova, and Carmen Sánchez-Ávila. 2014. Supervised classification methods applied to keystroke dynamics through mobile devices. In Security Technology (ICCST), 2014 International Carnahan Conference on. IEEE, 1--6.
[5]
Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, and René Mayrhofer. 2014. Shakeunlock: Securely unlock mobile devices by shaking them together. In Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM, 165--174.
[6]
Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE transactions on information forensics and security 8, 1 (2013), 136--148.
[7]
R Stockton Gaines, William Lisowski, S James Press, and Norman Shapiro. 1980. Authentication by keystroke timing: Some preliminary results. Technical Report. RAND CORP SANTA MONICA CA.
[8]
Lauren Guenveur. 2017. Nearly 16% of US consumers now own wearables. (25 Jan. 2017). Retrieved Jul 9, 2017 from https://www.kantarworldpanel.com/global/News/Nearly-16-of-US-Consumers-and-9-in-EU4-Now-Own-Wearables
[9]
Daniel Hintze, Rainhard D Findling, Sebastian Scholz, and René Mayrhofer. 2014. Mobile device usage characteristics: The effect of context and form factor on locked and unlocked usage. In Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia. ACM, 105--114.
[10]
Grant Ho. 2014. Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical Report. Technical report, Stanford University.
[11]
Ryo Izuta, Kazuya Murao, Tsutomu Terada, Toshiki Iso, Hiroshi Inamura, and Masahiko Tsukamoto. 2016. Screen Unlocking Method using Behavioral Characteristics when Taking Mobile Phone from Pocket. In Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media. ACM, 110--114.
[12]
Nattapong Jeanjaitrong and Pattarasinee Bhattarakosol. 2013. Feasibility study on authentication based keystroke dynamic over touch-screen devices. In Communications and Information Technologies (ISCIT), 2013 13th International Symposium on. IEEE, 238--242.
[13]
Weizhi Meng, Duncan S. Wong, and Lam-For Kwok. 2014. The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Information Management & Computer Security 22, 2 (2014), 155--166.
[14]
Anand Raghunathan, Srivaths Ravi, Sunil Hattangady, and J-J Quisquater. 2003. Securing mobile appliances: New challenges for the system designer. In Design, Automation and Test in Europe Conference and Exhibition, 2003. IEEE, 176--181.
[15]
Sougata Sen and Kartik Muralidharan. 2014. Putting 'pressure' on mobile authentication. In Mobile Computing and Ubiquitous Networking (ICMU), 2014 Seventh International Conference on. IEEE, 56--61.
[16]
Chao Shen, Yong Zhang, Xiaohong Guan, and Roy A Maxion. 2016. Performance analysis of touch-interaction behavior for active smartphone authentication. IEEE Transactions on Information Forensics and Security 11, 3 (2016), 498--513.
[17]
Cheng-Jung Tasia, Ting-Yi Chang, Pei-Cheng Cheng, and Jyun-Hao Lin. 2014. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Security and Communication Networks 7, 4 (2014), 750--758.
[18]
Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. 2015. Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration. In Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia. ACM, 108--116.
[19]
Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. 2016. A survey on touch dynamics authentication in mobile devices. Computers & Security 59 (2016), 210--235.
[20]
Matt Wolff. 2013. Behavioral biometric identification on mobile devices. In International Conference on Augmented Cognition. Springer, 783--791.
[21]
Nan Zheng, Kun Bai, Hai Huang, and Haining Wang. 2014. You are how you touch: User verification on smartphones via tapping behaviors. In Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. IEEE, 221--232.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM2017: Proceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia
December 2017
246 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Johannes Kepler University, Linz, Austria
  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Authentication
  2. Security
  3. Usability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

MoMM2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media