ABSTRACT
In this paper an adaptive solution to secure the authentication process of cellular phones has been proposed. Gait and location tracks of the owner are used as the metrics for authentication. The cellular phone is envisioned to become as adaptive as a pet animal of the owner. The cellular phone learns various intrinsic attributes of the owner like his voice, face, hand and fingerprint geometry and interesting patterns in the owner's daily life and remembers those to continually check against any anomalous behavior that may occur due to the stealing of the phone. The checking is done level wise. Higher level of authentication is more stringent. Only when the cellular phone recognizes significant anomaly in a lower level, it goes one level up in the security hierarchy. The iPhone's accelerometer and A-GPS module have been utilized to record gait and location signatures. A fast and memory efficient variation of Dynamic Time Warping (DTW) algorithm called FastDTW has been used to compute the similarity score between gait samples.
- Jani Mäntyjärvi, Mikko Lindholm, Elena Vildjiounaite, Satu-Marja Mäkelä, and Heikki Ailisto. Identifying Users Of Portable Devices From Gait Pattern With Accelerometers. http://www.vtt.fi/inf/julkaisut/muut/2005/ICASSP05.pdfGoogle Scholar
- Ioannis G. Damousis, Dimitrios Tzovaras, and Evangelos Bekiaris. Unobtrusive Multimodal Biometric Authentication: The HUMABIO Project Concept. http://www.hindawi.com/journals/asp/2008/265767.abs.html Google ScholarDigital Library
- Jonas Richiardi et al. 2005. A multimodal biometric authentication framework, October 2005, 3rd COST 275 Workshop, Hatfield, UK.Google Scholar
- Pamela Briggs, Patrick L. Olivier. 2008. Biometric daemons: authentication via electronic pets. CHI Extended Abstracts 2008: 2423--2432 Google ScholarDigital Library
- Ning Wang, Eliathamby Ambikairajah, Branko G. Celler, and Nigel H. Lovell. 2008. Accelerometry Based Classification Of Gait Patterns Using Empirical Mode Decomposition. IEEE Conference on Acoustics, Speech, and Signal Processing, 2008. ICASSP 2008. Pages 617--620.Google Scholar
- Arun Ross and Anil K. Jain. 2004. Multimodal Biometrics: An Overview. Proc. of 12th European Signal Processing Conference (EUSIPCO), (Vienna, Austria), pp. 1221--1224, September 2004.Google Scholar
- John Krumm. 2007. Inference Attacks on Location Tracks. Fifth International Conference on Pervasive Computing (Pervasive 2007), May 13-16, 2007, Toronto, Ontario, Canada. Google ScholarDigital Library
- Davrondzhon Gafurov and Einar Snekkenes. Gait Recognition Using Wearable Motion Recording Sensors. EURASIP Journal on Advances in Signal Processing, 2009, Special Issue on "Recent Advances in Biometric Systems: A Signal Processing Perspective". Google ScholarDigital Library
- Choon-Young Lee and Ju-Jang Lee. Estimation Of Walking Behavior Using Accelerometers In Gait Rehabilitation. http://koasas.kaist.ac.kr/bitstream/10203/8430/1/IntJ_061.pdfGoogle Scholar
- Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramasuriya, and Venu Vasudevan. uWave: Accelerometer-based personalized gesture recognition and its applications. in IEEE Int. Conf. Pervasive Computing and Communication (PerCom), March 2009. Google ScholarDigital Library
- Marc Bächlin, Johannes Schumm, Daniel Roggen, and Gerhard Tröster. 2009. Quantifying Gait Similarity: User Authentication and Real-World Challenge. ICB 2009: 1040--1049. Google ScholarDigital Library
- Liu Rong, Duan Zhiguo, Zhou Jianzhong, and Liu Ming. 2007. Identification of Individual Walking Patterns Using Gait Acceleration. The 1st International Conference On Bioinformatics And Biomedical Engineering, 2007. ICBBE 2007: 543--546.Google Scholar
- Toshiki Iso, Kenichi Yamazaki. 2006. Gait analyzer based on a cell phone with a single three-axis accelerometer. Mobile HCI 2006: 141--144 Google ScholarDigital Library
- Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol: Biometric Gait Authentication Using Accelerometer Sensor. JCP 1(7): 51--59 (2006)Google Scholar
- Stan Salvador, Philip Chan: Toward accurate dynamic time warping in linear time and space. Intell. Data Anal. 11(5): 561--580 (2007) Google ScholarDigital Library
- Sausan Yazji, Xi Chen, Robert P. Dick and Peter Scheuermann. 2009. Implicit User Re-authentication for Mobile Devices. SpringerLink. ISBN: 9783642028298. Pages: 325--339. Google ScholarDigital Library
- Sevasti Karatzouni, Nathan Clarke: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. SEC 2007: 253--263.Google Scholar
- http://www.techchee.com/2007/07/27/additional-security-for-cell-phone-iris-scanning/Google Scholar
- Joanna Rokita, Adam Krzyzak, Ching Y. Suen: Cell Phones Personal Authentication Systems Using Multimodal Biometrics. ICIAR 2008: 1013--1022 Google ScholarDigital Library
- Dennis Shasha and Yunyue Zhu. High Performance Discovery in Time Series: Techniques and Case Studies. Springer, pp. 87--99. NewYork, USA, 2004. Google ScholarDigital Library
- Nong Ye ed. The Handbook of Data Mining. Lawrence Erlbaum Associates, Inc., Publishers. New Jersey, USA, 2003.Google Scholar
- http://www.wavefrontlabs.com/Wavefront_Labs/Accelerometer_Data.htmlGoogle Scholar
- http://www.apple.com/iphone/iphone-3gs/high-technology.htmlGoogle Scholar
- http://java-ml.sourceforge.net/Google Scholar
- http://en.wikipedia.org/wiki/Mobile_banking.Google Scholar
Index Terms
- ePet: when cellular phone learns to recognize its owner
Recommendations
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Recently, Li and Hwang proposed a biometrics-based remote user authentication scheme using smart cards [Journal of Network and Computer Applications 33 (2010) 1-5]. The scheme is based on biometrics verification, smart card and one-way hash function, ...
A new signature scheme without random oracles
Digital signature is commonly used for authentication of a user or data. In order to ensure the security of a signature scheme, it is important to design a signature scheme with a security proof. In 1999, Gennaro et al. and Cramer et al. respectively ...
Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards
In a recent paper (BioMed Research International, 2013/491289), Khan et al. proposed an improved biometrics-based remote user authentication scheme with user anonymity. The scheme is believed to be secure against password guessing attack, user ...
Comments