Active authentication for mobile devices utilising behaviour profiling
dc.contributor.author | Li, F | |
dc.contributor.author | Clarke, Nathan | |
dc.contributor.author | Papadaki, Maria | |
dc.contributor.author | Dowland, P | |
dc.date.accessioned | 2017-12-07T13:34:49Z | |
dc.date.available | 2017-12-07T13:34:49Z | |
dc.date.issued | 2014-06 | |
dc.identifier.issn | 1615-5262 | |
dc.identifier.issn | 1615-5270 | |
dc.identifier.other | 3 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/10389 | |
dc.description.abstract |
With nearly 6 billion subscribers around the world, mobile devices have become an indispensable component in modern society. The majority of these devices rely upon passwords and personal identification numbers as a form of user authentication, and the weakness of these point-of-entry techniques is widely documented. Active authentication is designed to overcome this problem by utilising biometric techniques to continuously assess user identity. This paper describes a feasibility study into a behaviour profiling technique that utilises historical application usage to verify mobile users in a continuous manner. By utilising a combination of a rule-based classifier, a dynamic profiling technique and a smoothing function, the best experimental result for a users overall application usage was an equal error rate of 9.8 %. Based upon this result, the paper proceeds to propose a novel behaviour profiling framework that enables a user's identity to be verified through their application usage in a continuous and transparent manner. In order to balance the trade-off between security and usability, the framework is designed in a modular way that will not reject user access based upon a single application activity but a number of consecutive abnormal application usages. The proposed framework is then evaluated through simulation with results of 11.45 and 4.17 % for the false rejection rate and false acceptance rate, respectively. In comparison with point-of-entry-based approaches, behaviour profiling provides a significant improvement in both the security afforded to the device and user convenience. © 2013 Springer-Verlag Berlin Heidelberg. | |
dc.format.extent | 229-244 | |
dc.language | en | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media LLC | |
dc.subject | Active authentication | |
dc.subject | Behaviour profiling | |
dc.subject | Biometrics | |
dc.title | Active authentication for mobile devices utilising behaviour profiling | |
dc.type | journal-article | |
dc.type | Journal Article | |
plymouth.author-url | https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000336024300002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008 | |
plymouth.issue | 3 | |
plymouth.volume | 13 | |
plymouth.publication-status | Published | |
plymouth.journal | International Journal of Information Security | |
dc.identifier.doi | 10.1007/s10207-013-0209-6 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dc.identifier.eissn | 1615-5270 | |
dc.rights.embargoperiod | Not known | |
rioxxterms.versionofrecord | 10.1007/s10207-013-0209-6 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.type | Journal Article/Review |