Skip to main content

2019 | OriginalPaper | Buchkapitel

Behavioral Biometrics in Mobile Banking and Payment Applications

verfasst von : Piotr Kałużny

Erschienen in: Business Information Systems Workshops

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper presents an overview on the possible use of behavioral biometrics methods in mobile banking and payment applications. As mobile applications became more common, more and more users conduct payments using their smartphones. While requiring secure services, the customers often do not lock their devices and expose them to potential misuse and theft. Banks and financial institutions apply multiple anti-fraud and authentication systems - but to ensure the required usability, they must develop new ways to authenticate their users and authorize transactions. Answer to this problem comes with a family of behavioral biometric methods which can be utilized to secure those applications without hindering the usability. The goal of this paper is to describe potential areas in which behavioral biometrics can be used to ensure more secure mobile payments, increase usability and prevent frauds.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
Profile of movement, based on unique traits that identify walk pattern specific for a user.
 
3
Actually, the question of the extent of this privacy threatening behavior is always a trade-off, as banks e.g. keep customer actions which also contain potentially private information but if this information is used for fraud detection and widely accepted among users.
 
Literatur
5.
Zurück zum Zitat Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513–521 (2017)CrossRef Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513–521 (2017)CrossRef
6.
Zurück zum Zitat Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef
8.
Zurück zum Zitat Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manag. 1(1), 7 (2014)CrossRef Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manag. 1(1), 7 (2014)CrossRef
10.
Zurück zum Zitat Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. In: Sicherheit, pp. 1–12. Citeseer (2014) Gascon, H., Uellenbeck, S., Wolf, C., Rieck, K.: Continuous authentication on mobile devices by analysis of typing motion behavior. In: Sicherheit, pp. 1–12. Citeseer (2014)
11.
Zurück zum Zitat Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Secur. 13(3), 229–244 (2014)CrossRef Li, F., Clarke, N., Papadaki, M., Dowland, P.: Active authentication for mobile devices utilising behaviour profiling. Int. J. Inf. Secur. 13(3), 229–244 (2014)CrossRef
12.
Zurück zum Zitat Milton, L.C., Memon, A.: Intruder detector: a continuous authentication tool to model user behavior. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 286–291. IEEE (2016) Milton, L.C., Memon, A.: Intruder detector: a continuous authentication tool to model user behavior. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 286–291. IEEE (2016)
16.
Zurück zum Zitat Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)CrossRef Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)CrossRef
18.
Zurück zum Zitat Buriro, A., Crispo, B., Del Frari, F., Klardie, J., Wrona, K.: ITSME: multi-modal and unobtrusive behavioural user authentication for smartphones. In: Stajano, F., Mjølsnes, S.F., Jenkinson, G., Thorsheim, P. (eds.) PASSWORDS 2015. LNCS, vol. 9551, pp. 45–61. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29938-9_4CrossRef Buriro, A., Crispo, B., Del Frari, F., Klardie, J., Wrona, K.: ITSME: multi-modal and unobtrusive behavioural user authentication for smartphones. In: Stajano, F., Mjølsnes, S.F., Jenkinson, G., Thorsheim, P. (eds.) PASSWORDS 2015. LNCS, vol. 9551, pp. 45–61. Springer, Cham (2016). https://​doi.​org/​10.​1007/​978-3-319-29938-9_​4CrossRef
19.
Zurück zum Zitat Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Symposium on Usable Privacy and Security, SOUPS, vol. 14, pp. 187–198 (2014) Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Symposium on Usable Privacy and Security, SOUPS, vol. 14, pp. 187–198 (2014)
20.
Zurück zum Zitat Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. arXiv preprint arXiv:1410.7743 (2014) Kayacik, H.G., Just, M., Baillie, L., Aspinall, D., Micallef, N.: Data driven authentication: on the effectiveness of user behaviour modelling with mobile device sensors. arXiv preprint arXiv:​1410.​7743 (2014)
21.
Zurück zum Zitat Ehatisham-ul Haq, M., Azam, M.A., Naeem, U., Amin, Y., Loo, J.: Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 109, 24–35 (2018)CrossRef Ehatisham-ul Haq, M., Azam, M.A., Naeem, U., Amin, Y., Loo, J.: Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 109, 24–35 (2018)CrossRef
23.
Zurück zum Zitat Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998–2026 (2016)CrossRef Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998–2026 (2016)CrossRef
24.
Zurück zum Zitat Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. Int. J. Inf. Secur. 11(2), 65–83 (2012)CrossRef Guerra-Casanova, J., Sánchez-Ávila, C., Bailador, G., de Santos Sierra, A.: Authentication in mobile devices through hand gesture recognition. Int. J. Inf. Secur. 11(2), 65–83 (2012)CrossRef
25.
Zurück zum Zitat Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, pp. 187–190. ACM (2013) Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, pp. 187–190. ACM (2013)
26.
Zurück zum Zitat Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, pp. 1–16 (2013) Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS, pp. 1–16 (2013)
28.
Zurück zum Zitat Sultana, M., Paul, P.P., Gavrilova, M.: A concept of social behavioral biometrics: motivation, current developments, and future trends. In: 2014 International Conference on Cyberworlds (CW), pp. 271–278. IEEE (2014) Sultana, M., Paul, P.P., Gavrilova, M.: A concept of social behavioral biometrics: motivation, current developments, and future trends. In: 2014 International Conference on Cyberworlds (CW), pp. 271–278. IEEE (2014)
32.
Zurück zum Zitat Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39–50. ACM (2013) Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, pp. 39–50. ACM (2013)
33.
Zurück zum Zitat Zou, L., He, Q., Feng, X.: Cell phone verification from speech recordings using sparse representation. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1787–1791. IEEE (2015) Zou, L., He, Q., Feng, X.: Cell phone verification from speech recordings using sparse representation. In: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1787–1791. IEEE (2015)
35.
Zurück zum Zitat Alotaibi, S., Furnell, S., Clarke, N.: Transparent authentication systems for mobile device security: a review. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 406–413. IEEE (2015) Alotaibi, S., Furnell, S., Clarke, N.: Transparent authentication systems for mobile device security: a review. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 406–413. IEEE (2015)
36.
Zurück zum Zitat Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)CrossRef Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)CrossRef
37.
Zurück zum Zitat Ayed, M.B.: Method for adaptive authentication using a mobile device. US Patent 8,646,060, 4 Feb 2014 Ayed, M.B.: Method for adaptive authentication using a mobile device. US Patent 8,646,060, 4 Feb 2014
Metadaten
Titel
Behavioral Biometrics in Mobile Banking and Payment Applications
verfasst von
Piotr Kałużny
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-04849-5_55