skip to main content
10.1145/1655062.1655066acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

ePet: when cellular phone learns to recognize its owner

Published:09 November 2009Publication History

ABSTRACT

In this paper an adaptive solution to secure the authentication process of cellular phones has been proposed. Gait and location tracks of the owner are used as the metrics for authentication. The cellular phone is envisioned to become as adaptive as a pet animal of the owner. The cellular phone learns various intrinsic attributes of the owner like his voice, face, hand and fingerprint geometry and interesting patterns in the owner's daily life and remembers those to continually check against any anomalous behavior that may occur due to the stealing of the phone. The checking is done level wise. Higher level of authentication is more stringent. Only when the cellular phone recognizes significant anomaly in a lower level, it goes one level up in the security hierarchy. The iPhone's accelerometer and A-GPS module have been utilized to record gait and location signatures. A fast and memory efficient variation of Dynamic Time Warping (DTW) algorithm called FastDTW has been used to compute the similarity score between gait samples.

References

  1. Jani Mäntyjärvi, Mikko Lindholm, Elena Vildjiounaite, Satu-Marja Mäkelä, and Heikki Ailisto. Identifying Users Of Portable Devices From Gait Pattern With Accelerometers. http://www.vtt.fi/inf/julkaisut/muut/2005/ICASSP05.pdfGoogle ScholarGoogle Scholar
  2. Ioannis G. Damousis, Dimitrios Tzovaras, and Evangelos Bekiaris. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept. http://www.hindawi.com/journals/asp/2008/265767.abs.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jonas Richiardi et al. 2005. A multimodal biometric authentication framework, October 2005, 3rd COST 275 Workshop, Hatfield, UK.Google ScholarGoogle Scholar
  4. Pamela Briggs, Patrick L. Olivier. 2008. Biometric daemons: authentication via electronic pets. CHI Extended Abstracts 2008: 2423--2432 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ning Wang, Eliathamby Ambikairajah, Branko G. Celler, and Nigel H. Lovell. 2008. Accelerometry Based Classification Of Gait Patterns Using Empirical Mode Decomposition. IEEE Conference on Acoustics, Speech, and Signal Processing, 2008. ICASSP 2008. Pages 617--620.Google ScholarGoogle Scholar
  6. Arun Ross and Anil K. Jain. 2004. Multimodal Biometrics: An Overview. Proc. of 12th European Signal Processing Conference (EUSIPCO), (Vienna, Austria), pp. 1221--1224, September 2004.Google ScholarGoogle Scholar
  7. John Krumm. 2007. Inference Attacks on Location Tracks. Fifth International Conference on Pervasive Computing (Pervasive 2007), May 13-16, 2007, Toronto, Ontario, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Davrondzhon Gafurov and Einar Snekkenes. Gait Recognition Using Wearable Motion Recording Sensors. EURASIP Journal on Advances in Signal Processing, 2009, Special Issue on "Recent Advances in Biometric Systems: A Signal Processing Perspective". Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Choon-Young Lee and Ju-Jang Lee. Estimation Of Walking Behavior Using Accelerometers In Gait Rehabilitation. http://koasas.kaist.ac.kr/bitstream/10203/8430/1/IntJ_061.pdfGoogle ScholarGoogle Scholar
  10. Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramasuriya, and Venu Vasudevan. uWave: Accelerometer-based personalized gesture recognition and its applications. in IEEE Int. Conf. Pervasive Computing and Communication (PerCom), March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Marc Bächlin, Johannes Schumm, Daniel Roggen, and Gerhard Tröster. 2009. Quantifying Gait Similarity: User Authentication and Real-World Challenge. ICB 2009: 1040--1049. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Liu Rong, Duan Zhiguo, Zhou Jianzhong, and Liu Ming. 2007. Identification of Individual Walking Patterns Using Gait Acceleration. The 1st International Conference On Bioinformatics And Biomedical Engineering, 2007. ICBBE 2007: 543--546.Google ScholarGoogle Scholar
  13. Toshiki Iso, Kenichi Yamazaki. 2006. Gait analyzer based on a cell phone with a single three-axis accelerometer. Mobile HCI 2006: 141--144 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol: Biometric Gait Authentication Using Accelerometer Sensor. JCP 1(7): 51--59 (2006)Google ScholarGoogle Scholar
  15. Stan Salvador, Philip Chan: Toward accurate dynamic time warping in linear time and space. Intell. Data Anal. 11(5): 561--580 (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sausan Yazji, Xi Chen, Robert P. Dick and Peter Scheuermann. 2009. Implicit User Re-authentication for Mobile Devices. SpringerLink. ISBN: 9783642028298. Pages: 325--339. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sevasti Karatzouni, Nathan Clarke: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. SEC 2007: 253--263.Google ScholarGoogle Scholar
  18. http://www.techchee.com/2007/07/27/additional-security-for-cell-phone-iris-scanning/Google ScholarGoogle Scholar
  19. Joanna Rokita, Adam Krzyzak, Ching Y. Suen: Cell Phones Personal Authentication Systems Using Multimodal Biometrics. ICIAR 2008: 1013--1022 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Dennis Shasha and Yunyue Zhu. High Performance Discovery in Time Series: Techniques and Case Studies. Springer, pp. 87--99. NewYork, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Nong Ye ed. The Handbook of Data Mining. Lawrence Erlbaum Associates, Inc., Publishers. New Jersey, USA, 2003.Google ScholarGoogle Scholar
  22. http://www.wavefrontlabs.com/Wavefront_Labs/Accelerometer_Data.htmlGoogle ScholarGoogle Scholar
  23. http://www.apple.com/iphone/iphone-3gs/high-technology.htmlGoogle ScholarGoogle Scholar
  24. http://java-ml.sourceforge.net/Google ScholarGoogle Scholar
  25. http://en.wikipedia.org/wiki/Mobile_banking.Google ScholarGoogle Scholar

Index Terms

  1. ePet: when cellular phone learns to recognize its owner

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SafeConfig '09: Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
      November 2009
      88 pages
      ISBN:9781605587783
      DOI:10.1145/1655062

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate22of61submissions,36%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader