Show simple item record

dc.contributor.authorLi, F
dc.contributor.authorClarke, Nathan
dc.contributor.authorPapadaki, Maria
dc.contributor.authorDowland, P
dc.date.accessioned2017-12-07T13:34:49Z
dc.date.available2017-12-07T13:34:49Z
dc.date.issued2014-06
dc.identifier.issn1615-5262
dc.identifier.issn1615-5270
dc.identifier.other3
dc.identifier.urihttp://hdl.handle.net/10026.1/10389
dc.description.abstract

With nearly 6 billion subscribers around the world, mobile devices have become an indispensable component in modern society. The majority of these devices rely upon passwords and personal identification numbers as a form of user authentication, and the weakness of these point-of-entry techniques is widely documented. Active authentication is designed to overcome this problem by utilising biometric techniques to continuously assess user identity. This paper describes a feasibility study into a behaviour profiling technique that utilises historical application usage to verify mobile users in a continuous manner. By utilising a combination of a rule-based classifier, a dynamic profiling technique and a smoothing function, the best experimental result for a users overall application usage was an equal error rate of 9.8 %. Based upon this result, the paper proceeds to propose a novel behaviour profiling framework that enables a user's identity to be verified through their application usage in a continuous and transparent manner. In order to balance the trade-off between security and usability, the framework is designed in a modular way that will not reject user access based upon a single application activity but a number of consecutive abnormal application usages. The proposed framework is then evaluated through simulation with results of 11.45 and 4.17 % for the false rejection rate and false acceptance rate, respectively. In comparison with point-of-entry-based approaches, behaviour profiling provides a significant improvement in both the security afforded to the device and user convenience. © 2013 Springer-Verlag Berlin Heidelberg.

dc.format.extent229-244
dc.languageen
dc.language.isoen
dc.publisherSpringer Science and Business Media LLC
dc.subjectActive authentication
dc.subjectBehaviour profiling
dc.subjectBiometrics
dc.titleActive authentication for mobile devices utilising behaviour profiling
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000336024300002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.issue3
plymouth.volume13
plymouth.publication-statusPublished
plymouth.journalInternational Journal of Information Security
dc.identifier.doi10.1007/s10207-013-0209-6
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.identifier.eissn1615-5270
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1007/s10207-013-0209-6
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV