Sie sind auf Seite 1von 8

Design of Touch Dynamics based User Authentication with

an Adaptive Mechanism on Mobile Phones

Yuxin Meng, Duncan S. Wong and Lam-For Kwok


Department of Computer Science
City University of Hong Kong, Hong Kong SAR, China
{yuxin.meng, duncan, cslfkwok}@cityu.edu.hk

ABSTRACT common in our daily lives. The Android OS and the iPhone
Behavioral-biometric based authentication schemes on mo- iOS have shared a nearly combined 87.8 percent in the cur-
bile phones usually begin by establishing a normal-behavioral rent mobile phone market (i.e., Android OS mostly captured
model using machine learning classiers and then identify 69 global mobile phone market share in 2012) [11].
behavioral anomalies through comparing current behavioral With the popularity of touchscreen mobile phones, more
events with the established model. If an anomaly is de- and more users are likely to use them as frequent storage
tected, this kind of schemes will require the user for vali- medium for sensitive information (e.g., passwords, trade se-
dation (i.e., input correct PIN). In this paper, we rst pro- crets, credentials, photos) [3, 9] and to use them for se-
pose a lightweight touch-dynamics-based user authentica- curity sensitive tasks (i.e., authorizing commercial transac-
tion scheme on a touchscreen mobile phone, which consists tions [25]). In this case, mobile phones have become an at-
of only 8 touch-gesture related features. In addition, we tractive target for hackers and malware [14, 23]. For exam-
further design an adaptive mechanism that can periodically ple, an attacker can easily reverse engineer and manipulate
select a better classier to maintain the authentication accu- any application from the mobile market, and then utilize
racy during user authentication. As a study, we implement these plagiarized applications to gain personal prole [20].
a cost-based metric that enables this mechanism to choose a In addition, mobile phones are easily lost or stolen [24]. The
less costly classier. In the evaluation, the experimental re- stored personal and sensitive information in these lost or
sults of involving 50 participants indicate that our proposed stolen mobile phones can be exploited for malicious use by
user authentication scheme can achieve an average error rate others [18]. Therefore, in order to enhance mobile security
of 2.46% and that the adaptive mechanism can maintain the and protect users data, it is very crucial to develop a pow-
authentication accuracy at a relatively stable level. erful user authentication scheme for mobile phones.
Behavioral-biometric based authentication uses measure-
ments from human actions such as keystroke dynamics [1]
Categories and Subject Descriptors and mouse dynamics [21] for authenticating users. Such
D.4.6 [Operating Systems]: Security and ProtectionAc- schemes are continuous authentications [3] which can mit-
cess controls, Authentication; H.5.2 [Information Inter- igate the issue of one-time authentication by continuously
faces and Presentation]: User InterfacesInput devices verifying whether a user is legitimate or not. In addition, the
and strategies implementation of the behavioral-biometric based authen-
tication usually does not need additional hardware. Both
General Terms keystroke dynamics and mouse dynamics were studied in a
desktop, but only keystroke dynamics has been investigated
Security, Design, Algorithms
on mobile phones [2, 27].
As touchscreen mobile devices are rapidly becoming a key
Keywords computing platform (i.e., 800 million mobile phones are ex-
Behavioral Biometrics, Touch Dynamics, User Authentica- pected to be touch-enabled by 2014 [13]) and more research
tion, Access Control, Mobile Security and Usability works recently focus on this eld such as FAST [3] and
Touchalytics [5], we believe that developing user authenti-
1. INTRODUCTION cation schemes based on touch dynamics is becoming more
and more important on touchscreen mobile phones.
Mobile phones, especially touchscreen mobile phones such
Contributions. In this paper, we propose a lightweight
as Android phones and iPhones, are becoming increasingly
touch-dynamics-based user authentication scheme with less
workload in data processing, which consists of only 8 touch-
gesture related features, and we further design an adaptive
Permission to make digital or hard copies of all or part of this work for mechanism that selects a better classier to authenticate
personal or classroom use is granted without fee provided that copies are users. The major contributions of our work can be summa-
not made or distributed for prot or commercial advantage and that copies rized as follows:
bear this notice and the full citation on the rst page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specic We propose a new and lightweight touch-dynamics-
permission and/or a fee.
SAC14 March 24-28, 2014, Gyeongju, Korea. based user authentication scheme which is composed
Copyright 2014 ACM 978-1-4503-2469-4/14/03 ...$15.00. of 8 touch-gesture related features such as the number
http://dx.doi.org/10.1145/2554850.2554931 1680
of touch movements/single-touch/multi-touch per ses- 2.1 Lightweight Touch-Dynamics-based Authen-
sion, the average time duration of touch movements/single- tication Scheme
touch/multi-touch per session, average speed of touch To reduce the workload of processing touch-gesture re-
movement and touch pressure. lated data, we propose a lightweight touch-dynamics-based
To maintain the accuracy of classiers in authenticat- authentication scheme that consists of only 8 touch-gesture
ing users, we further design an adaptive mechanism related features as follows.
that enables to adaptively select a better classier by
measuring their performance with appropriate metrics. 1. The number of touch movements per session (denoted
In this work, we conduct a study of measuring classi- NTM)
ers by means of a cost-based metric which can select 2. The number of single-touch events per session (denoted
the least costly classier. NST)
To investigate the performance of our proposed au-
3. The number of multi-touch events per session (denoted
thentication scheme and the adaptive mechanism, we
NMT)
conducted an experiment with a total of 50 users on
Android phones. The study results indicate that our 4. The average time duration of touch movements per
proposed authentication scheme can achieve an aver- session (denoted ATTM)
age error rate of approximately 2.46%1 , and that the
adaptive mechanism can maintain the authentication 5. The average time duration of single-touch per session
accuracy at a relatively high and stable level. (denoted ATST)

The rest of the paper is organized as follows. We describe 6. The average time duration of multi-touch per session
our proposed touch-dynamics-based authentication scheme (denoted ATMT)
and the cost-based adaptive mechanism in Section 2. Sec-
7. Average speed of touch movement (denoted ASTM)
tion 3 illustrates the implementation in detail. We then
evaluate our proposed authentication scheme and the adap- 8. Average touch pressure (denoted ATP)
tive mechanism in Section 4. We discuss the limitations in
Section 5 and describe related work in Section 6. Finally, The reason of adopting the features like the number of
we conclude our work with future directions in Section 7. touch movements/single-touch/multi-touch per session and
the average time duration of touch movements/single-touch/
2. OUR PROPOSED METHOD multi-touch per session is that these features are relatively
In this section, we rst propose a lightweight and e- easier to compute with less workload regarding time con-
cient touch-dynamics-based authentication scheme, which sumption compared to speed calculation (we give an analy-
consists of 8 touch-gesture related features. The purpose of sis later). In addition, it has been shown in [16] that these
proposing such a lightweight scheme is for reducing the time features are good in characterizing the touch behavior of
consumption in data processing. For example, when com- a user, and hence potentially can provide a sucient and
pared with our previous work [16] which used 21 features, eective dierentiation among users.
our current scheme greatly reduces the number of nested According to [16], it is noticed that the calculation of ges-
loops for generating one so-called authentication signature ture speed (i.e., calculating the speed of a touch gesture
from the collected features from 37 (or more) down to only for a direction) is more time consuming when compared
8. This greatly reduces the processing time and makes the with that for gesture frequency counting or time duration
entire authentication scheme lightweight. computation, since more nested loops are required. In this
In practice, it is a challenging task to select an appropri- work, we therefore implement a more compact speed-related
ate machine learning classier in authenticating users since feature, named average speed of touch movement (denoted
the performance of a particular classier may be uctuant ASTM), which only requires one nested loop in the com-
varied with the used datasets [12]. We therefore design an putation. This feature can be computed as below:
adaptive mechanism that can select an appropriate machine

learning classier in an adaptive way. The main purpose of n (Xn Xn1 )2 +(Yn Yn1 )2
this mechanism is to maintain the authentication accuracy i=2 Sn Sn1
AST M = (n N ) (1)
by selecting a better classier. n
As a study, we implement this mechanism using a cost- where (Xn , Yn ) and (Xn1 , Yn1 ) are two points in a
based metric. The merits of this mechanism are: 1) adap- touch movement, Sn and Sn1 are the corresponding event
tively selecting a less costly classier which can reduce the system time for these two points and n is the number of
information loss during the establishment of normal-behavior recorded points during a touch movement.
models (where the smaller the cost-based metric, the less In Fig. 1, we show the average speed of touch movement
information loss during the establishment); and 2) main- (ASTM ) for 8 users. It is noticeable that dierent users have
taining the authentication accuracy at a relatively high and dierent average speed in performing the touch movement
stable level since the most accurate classier (with the least so that we can use this feature to characterize and hence
cost-based metric) could be used in the authentication. The distinguish dierent users.
relationship between the accuracy and the cost will be illus- Additionally, we further employ a feature of average touch
trated in Section 4.3.2. pressure (denoted ATP) in our lightweight user authentica-
1 tion scheme, which measures the pressure on average when
In this work, error rate is the average of false acceptance
rate and false rejection rate. a touch event on the touchscreen.
1681
160

Table 1: A brief comparison between our scheme

Average Speed of Touch Movement (pix/s)


140
and [16].
120
Comparison Our Scheme Scheme in [16]
100
# of features 8 21
80
Data processing
8 nested loops  37 nested loops
60 for one AutSig
40

20
rections are to be calculated. One nested loop is consumed
0
User1 User2 User3 User4 User5 User6 User7 User8
for calculating the directions and another nested loop is re-
User quired for calculating averaged values, and hence each of
these 16 features already requires 2 nested loops. Plus an-
Figure 1: The average speed of touch movement other 5 features, at least 37 nested loops are needed during
(ASTM) for 8 users. the feature computation. We give a brief comparison be-
tween our scheme and [16] in Table 1. The table shows that
our scheme can greatly reduce the time consumption in data
0.25 processing.

2.2 Cost-based Measurement


Average Touch Pressure (ATP)

0.20

The designed adaptive mechanism is used to select a bet-


0.15
ter classier in an adaptive way. In this work, as a study, we
0.10
tune and implement a cost-based metric (called relative ex-
pected cost) in the process of classier selection, based on our
0.05
work [15]. This metric enables to measure the performance
of dierent classiers from the view of cost.
0.00 Next, we provide some denitions related to the cost-
User1 User2 User3 User4 User5 User6 User7 User8
User
based measurement based on those given in [6] and [15].
Denition1. A Cost Ratio (C) is calculated as C =
Figure 2: The average touch pressure (ATM) for 8 C /C , where C represents the cost of identifying an im-
users. poster as a legitimate user and C represents the cost of
identifying a legitimate user as an imposter.
The feature of touch pressure has been studied on a mo- Denition2. A cost-based decision tree can be built that
bile phone [22] and showed positive results of authenticating is similar to [6]. The probability of P 1 means the probabil-
users. Note that in real-world applications, the quality of ity that the detector reports a legitimate user, P 2 means
this feature is depending on the sensors in mobile phones. the conditional probability of legitimate user given that the
But with the increased capability of mobile phones, current detector identies as a legitimate user, P 3 means the condi-
sensors are able for providing such feature [7, 22]. In Fig. 2, tional probability of legitimate user given that the detector
we show the average touch pressure (ATP ) for 8 dierent identies as an imposter.
users. It is noticeable that dierent users have dierent val- By applying Bayes Theorem, P 1, P 2 and P 3 can be cal-
ues of ATP, so that it can be used to characterize the touch culated as below:
behavior of a user.
Therefore, an authentication signature (AutSig) of our pro-
posed user authentication is composed of the 8 features above P1 = (1 )(1 P ) + P (2)
and can be represented as follows.
P2 = (1 )(1 P )/[(1 )(1 P ) + P ] (3)
AutSig =
{NTM, NST, NMT, ATTM, ATST, ATMT, ASTM, ATP}
P3 = (1 P )/[(1 P ) + (1 )P ] (4)
Discussions on time consumption. Generally, for a
user authentication scheme, time consumption of data pro- where represents false positive rate (FP, P (I|L)), rep-
cessing mainly depends on the number of touch gestures and resents false negative rate (FN, P (L|I)) and P represents the
relevant dened features. If given a session record, the num- prior probability of detecting an imposter. Note that and
ber of touch gestures can be determined. In this work, our are two parameters of a classier.
scheme consists of 8 touch-gesture related features and each Denition3. The Initial Expected Cost (Ciec ) is dened
feature can be easily computed using operations of counting as the sum of the products of the probabilities of the de-
and one nested loop. With the same set of data as used tectors outputs and the expected costs conditional on the
in [16], our scheme proposed above in this paper only re- outputs, which can be calculated as Ciec = min{CP, (1
quires 8 nested loops to nish processing the data set while )(1 P )} + min{C(1 )P, (1 P )}, based on [6].
the method proposed in [16] requires at least 37 nested loops Based on [8], we notice that the Ciec suered from some
to nish processing the data set. limitations in real scenarios. For instance, it has nothing to

The scheme in [16] takes 21 touch-gesture related features do with and if CP < 1 , (1 ) (1 P ) 1. To
rather than 8. Also in 16 out of these 21 features, touch di- solve the issue, similar to [15], we therefore tune a measure
1682
Table 2: A sample of raw data collected from touchscreen inputs which is corresponding to Fig. 3 (b).
Input Type X-Coordinate Y-Coordinate Timing Pressure
Press Down 122.71380 588.37286 1090828 0.090196080
Press Move 126.11902 581.70825 - 0.101960786
Press Move 133.05556 568.37897 - 0.125686300
Press Move 143.64955 552.66050 - 0.125686300
Press Move 157.64876 530.02600 - 0.125462100
Press Up 159.54180 527.91720 109212 0.125462100

of relative expected cost as follows.


Denition4. The Relative Expected Cost (Crec ) is de-
ned as a relative sum tuned from the Initial Expected Cost,
which can be calculated as follows.

Crec = CP + (1 P ) (5)
Thus, we can use the Relative Expected Cost (Crec ) to
evaluate the performance of dierent machine learning clas-
siers in detecting behavioral anomalies and to determine
the most appropriate classier. When we obtain the train-
ing dataset, the values of , and P can be computed in ad- (a) (b) (c)
vance. Generally, a desirable (better) classier should have a
low (er) relative expected cost, which means relatively less in-
formation loss during the establishment of normal-behavior Figure 3: The implementation of the touch-
model. More details about the derivation of P 1, P 2, P 3 can dynamics-based authentication scheme: (a) Inter-
refer to work [6] and [15]. face: CyanogenMod Android OS; (b) Instance1: raw
data collection; (c) Instance2: raw data collection.
3. IMPLEMENTATION is relative to the last start-up of the Android phone, there-
In this section, we introduce the implementation of the fore, the duration of each touch input can then be computed
proposed touch-dynamics-based user authentication scheme by taking the dierence in system-time. Then, from the fol-
such as data collection and session identication. lowing red boxes, the coordinates x (i.e., x =122.7138) and
y (i.e., y=588.37286) are also recorded. The last red box
3.1 Data Collection presents the touch pressure (i.e., pressure=0.09019608).5
To implement the touch-dynamics-based user authentica- The records in Fig. 3 (b) show that there are a series
tion scheme, we used a Google/HTC Nexus One Android of touch-press events following the touch press down, so
phone2 with a multi-touch capacitive touchscreen (resolu- that we can know that this is a touch movement. For the
tion 480 800 px) to collect and process data. touch pressure, our application can capture slight changes
The major advantage of using this particular phone is that even within a touch movement. For instance, Fig. 3 (b)
its stock Android OS can be replaced with a self-modied shows that the touch pressure changes from 0.09019608
customized-Android-OS version. Specically, we updated to 0.101960786, and from 0.101960786 to 0.1256863. In
the phone with a modied Android OS version 2.2 based Fig. 3 (c), we show another instance (called Instance2 ) of
on CyanogenMod.3 The modication consists of changes to touch movement by another user. It is visible that the values
the application framework layer to record raw input data of touch pressure are dierent varying with dierent users.
from the touchscreen, such as the timing of touch inputs, the One sample of collected raw data corresponding to Fig. 3
coordinates x and y, the types of the input (e.g., press down, (b) is presented in Table 2.
press up) and the touch pressure. In addition, we installed The data collection in Fig. 3 also shows that no special
a separate application that enables us to easily extract the hardware is required for our proposed scheme, the infor-
recorded data from the phone.4 mation can be collected by updating certain parts of the
The interface of the CyanogenMod Android OS can refer Android application framework.
to Fig. 3 (a). In Fig. 3 (b), we show an instance (called In-
stance1 ) of raw data collection and highlight the important 3.2 Session Identication
items with red boxes. For example, the rst red box shows During the authentication, the user authentication scheme
that an action of press down is detected and its correspond- has to extract an authentication signature for each session
ing timing (system-time) is 1090828. Note that this timing and compare dierent extracted authentication signatures
2 5
The CPU of this particular phone is 1GHz while the storage During the implementation, we used two log commands
memory is 512M. such as Slog.v and Slog.i to output the recorded data. There-
3
http://www.cyanogenmod.com/ fore in the log application, we can obtain two log items
4
A Beta version of our customized-Android OS can be with dierent log titles (i.e., V/Action Inputdevice and
downloaded from Sourceforge: https://sourceforge. I/InputDevice) but they present the same information. We
net/projects/touchdynamicsauthentication/files/ only use these two log commands to examine the application.
Android_OS/. In the data analysis, we only treat them as one.
1683
across sessions. The scheme then can determine whether the False Acceptance Rate (FAR): indicates the probabil-
current user is a legitimate user or not. Thus, session iden- ity that an impostor is classied as a legitimate user.
tication is a critical factor for an authentication scheme.
Dierent from [16] where a 10-minute session (called time- False Rejection Rate (FRR): indicates the probability
based session) was used, in this work we dene an event- that a legitimate user is classied as an impostor.
based session that includes a total of 120 touch gestures in Ideally, an authentication accuracy of 100 percent is desir-
each session. The main reason is that the number of touch able while it is not realistic. In practice, a trade-o is usually
gestures may be varied if using the time-based session (i.e., made between the false acceptance rate (security) and the
the number of collected touch gestures may be quite small false rejection rate (usability). Generally, a false rejection is
in some sessions) while the number of touch gestures can be less costly than a false acceptance, since a higher false accep-
secured if using the event-based session. In this case, the tance rate can lower the security level of the authentication
use of event-based session is expected to improve the eec- system, whereas a higher false rejection rate can frustrate a
tiveness of authentication through providing enough gesture legitimate user, which is still unfortunate but arguably less
data for analysis. problematic than a lower security level. In terms of security
Therefore, the beginning and the end of a session in this and usability, both lower FAR and FRR are desirable.
work can be determined as follows:
A session ends if the number of touch gestures of the 4.3 Evaluation Results
current session has reached or exceeded 120. In this evaluation, we mainly conducted two experiments.
The rst one is to evaluate the performance of our proposed
A new session starts when a touch input is recorded authentication scheme, and the second one is to evaluate the
and the last session has ended. performance of the adaptive mechanism.
The session start and session end events can be easily
determined by analyzing the number of touch gestures in 4.3.1 Experiment1.
the raw data log. In this experiment, we selected 4 classiers, such as Deci-
sion Tree (J48 ), Naive Bayes (NBayes), Radial Basis Func-
4. EVALUATION tion Network (RBFN ) and Back Propagation Neural Net-
work (BPNN ), from the WEKA platform [26], which pro-
In this section, we describe our experimental methodology,
vides a set of machine learning classiers, and we addition-
introduce the employed metrics of evaluating our proposed
ally selected another classier of PSO-RBFN from [16].
touch-dynamics-based authentication scheme and present the
We test each classier with the collected data (e.g., au-
experimental results.
thentication signatures) and get the FAR and FRR for each
4.1 Methodology user. In particular, we used 17 sessions data (68% of the
In the study, we involved 50 Android phone users (24 fe- total sessions) in the training phase and the remaining for
male and 26 male) to participate in our experiments and testing. The results of the FAR, FRR, average error rate
among the participants, 80 percent of them were students (AER) and standard deviation (SD) are shown in Table 3.
while the others are senior citizens, engineers and business- This table shows that in this experiment, the classier of
men. All the participants were regular mobile phone users PSO-RBFN can achieve the best performance with an aver-
and ranged in age from 16 to 55 years. In the data collec- age error rate of 2.46% (where FAR=2.55%, FRR=2.37%).
tion, we provided all the participants with an Android phone The reason is that PSO-RBFN can better deal with varia-
(Google/HTC Nexus One) equipped with our modied An- tions in a users touch behavior compared to other selected
droid OS. Therefore, all participants used the same phone to classiers in this experiment.
ensure that all data was collected under the same settings. In addition, compared to the results obtained in [16], we
Before starting the collection, we described our objective nd that all classiers shown in Table 3 are performed better
to all participants and showed what kind of data would be when using our proposed new scheme than using the scheme
collected. We further asked participants to use the Android in [16]. For example, the AER of PSO-RBFN is improved
phones the same way they would use their own phones in from 2.92% to 2.46%, while for RBFN and BPNN, their
their normal lives, such as browsing websites, accessing les AER is improved from 7.71% to 5.16%, and from 11.58%
and operating on any applications. In particular, partic- to 7.01% respectively. These results illustrate that our pro-
ipants could do actual data collection outside of the lab, posed touch-dynamics-based authentication scheme in this
allowing them to get familiar with the phone rst. They work is more eective (and even more ecient) in authenti-
could also decide when to start the collection process (al- cating a user than the scheme in [16].
lowing them enough time to get familiar). All participants 4.3.2 Experiment2.
are required to nish 25 sessions within 3 days when they
are using the phone. To evaluate the adaptive mechanism, we used three clas-
We thus collected raw data for altogether 1250 sessions siers of J48, IBK (KNN) and NBayes as a case study in
of 120 touch events each, with an average of 25 sessions per this experiment. Note that the selection of these three clas-
user. All the features were then analyzed and extracted from siers is only to verify the adaptive property of the designed
the collected raw data. mechanism. The cost ratio C is set to 10.6 More details
of the parameter settings and algorithm selection can refer
4.2 Evaluation Metrics to [15]. The results of classier selection with cost values
In this work, we utilize the following two metrics to mea- (relative expected cost) are presented in Table 4.
sure the authentication accuracy of our proposed touch- 6
The cost ratio can be tuned according to dierent experi-
dynamics-based authentication scheme: ment settings.
1684
Table 3: Evaluation results in Experiment1.
Measure J48 NBayes RBFN BPNN PSO-RBFN
FAR (%) 18.48 17.87 5.48 6.81 2.55
FRR (%) 17.78 15.81 4.83 7.21 2.37
Avg. err. rate 18.13 16.84 5.16 7.01 2.46
SD in FAR 15.34 11.15 4.53 5.02 0.98
SD in FRR 16.82 9.13 3.45 5.75 1.03

Table 4: The results of classier selection with cost values.


UserID 10 sessions 15 sessions 20 sessions 25 sessions
User1 J48 (1.3175) J48 (1.2029) IBK (1.2110) IBK (1.2018)
User2 IBK (1.2521) NBayes (1.3562) NBayes (1.2872) IBK (1.2039)
User3 IBK (1.2452) J48 (1.3451) J48 (1.3344) NBayes (1.4576)
User4 J48 (1.4476) NBayes (1.5466) J48 (1.3476) J48 (1.2231)
User5 J48 (1.4142) IBK (1.3320) IBK (1.3765) J48 (1.3028)
User6 NBayes (1.3262) NBayes (1.2281) NBayes (1.2081) IBK (1.2116)
User7 J48 (1.3112) NBayes (1.2341) NBayes (1.1734) NBayes (1.2123)
User8 NBayes (1.2843) NBayes (1.2672) NBayes (1.2590) NBayes (1.2143)

22.0
21.5
The Adaptive Mechanism each updating slots, the adaptive mechanism can achieve
J48
21.0
20.5
NBayes a better average error rate since it can select the best al-
IBK
20.0
gorithm (from the pool) to authenticate users. Whereas
Average Error Rate of All Users

19.5
19.0
18.5
for other classiers, their performance is not stable. Take
18.0
17.5
the classier of NBayes as an example, we identify that
17.0
16.5
its performance is uctuant during the experiment. There-
16.0
15.5
fore, these results indicate that the adaptive mechanism can
15.0
14.5
maintain the authentication accuracy at a stable level (i.e.,
14.0
13.5
the authentication accuracy is at least the same as the best
13.0
12.5
classier in the pool).7
12.0
10 Sessions 15 Sessions 20 Sessions 25 Sessions
Workload of Adaptive Mechanism. During this exper-
Updating iment, we also evaluated the workload of the adaptive mech-
anism using the tool CPU-Z,8 which is a free application pro-
Figure 4: The performance comparison between the viding major CPU information about a device such as CPU
adaptive mechanism and other single classiers. load, CPU architecture, cores, clock speed, etc. Considering
the adaptive mechanism with the above three classiers, we
nd that the CPU workload was increased by a range from
2% to 4% in the experiment. Since the adaptive mechanism
In particular, we gradually increased the number of ses- can maintain the authentication accuracy at a relatively high
sions in the process of classier selection. We rst used 10 and stable level, we consider that the increased workload is
sessions (where 5 sessions were used for training), we then acceptable and it is worth implementing this mechanism on
continued to add 5 sessions (where the previous sessions were a mobile device.
used for training) each time. Table 4 presents that for dif-
ferent users, the selected classier may be dierent for each Further Discussion. The developed touch dynamics-
update. Take User1 as an example, according to the rela- based user authentication scheme is not intended to replace
tive expected cost, J48 classier is selected in the rst and the existing authentication methods such as PINs, but at-
second time with the cost value of 1.3175 and 1.2029 re- tempts to complement previously developed authentication
spectively, while IBK classier is selected in the third and schemes on mobile phones and provide other means to au-
fourth time with the cost value of 1.211 and 1.2018 respec- thenticate a mobile phone user [5]. For instance, by working
tively. Through analyzing the collected data, we nd that with a PIN-based authentication, both false acceptance rate
the adaptive mechanism can choose and output a classier and false rejection rate of such behavioral-biometric based
which achieves the smallest relative expected cost. user authentication schemes can be further decreased in real-
In [15], it is found that a smaller relative expected cost world applications (e.g., FAR is less than 2% and FRR is
means less information loss during the establishment of clas- close to zero) [27].
sier model, thus, a higher accuracy could be achieve. In
this work, we also nd that a classier with the smallest 5. LIMITATIONS AND POTENTIAL COUN-
relative expected cost can achieve the best classication ac-
curacy. These results indicate that the designed mechanism
TERMEASURES
can select a better classier in an adaptive way. 7
The stable here means that the adaptive mechanism can
In addition, we compare the adaptive mechanism with the achieve relatively good performance than the other classiers
performance of only using the J48, NBayes and IBK respec- in the classier pool.
tively in Fig. 4. The average error rates are computed by 8
https://play.google.com/store/apps/details?id=
using the sessions from all the 50 users. It is visible that for com.cpuid.cpu_z.
1685
In this section, we discuss some open problems of our work showed that their proposed multi-touch user interface could
and propose some potential countermeasures. outperform the traditional button GUI.
Fen et al. [3] recently designed a multi-touch gesture based
Users Behavioral Habit. To authenticate a user us-
mobile authentication scheme (called FAST), which could
ing the behavioral-biometric based authentication schemes,
support both passive and continuous authentication for mo-
a big problem is that the authentication accuracy may be de-
bile users based on users touch gestures. Their experimental
creased if the user performs very dierent from his/her daily
results showed that the FAST could achieve a FAR of 4.66%
inputs. This is a major limitation and an open problem for
and a FRR of 0.13%. But the FAST relies on a digital sen-
the behavioral-biometric based authentication.
sor glove that they built to collect the additional gesture
To mitigate this problem, we can employ or combine other
information. Later, Frank et al. [5] investigated whether a
authentication mechanisms (e.g., password-based authenti-
classier could continuously authenticate users based on the
cation) to improve the security. For example, if the current
way they interact with the touchscreen of a smart phone.
authentication is failed, a user is required to input a PIN.
By extracting 30 behavioral touch features, their classier
In [27], this combined approaches have proven to be helpful
achieved a median equal error rate of below 4% when the
and promising in real-world applications.
authentication test was carried out one week after the en-
Workload of Adaptive Mechanism. By using the rollment phase. Based on the ndings, they pointed out that
adaptive mechanism, some additional workload may be added their method could be implemented as a means to extend
to the mobile phones. But this mechanism can indeed pro- screen-lock time or as a part of a multimodal biometric au-
vide some benets like maintaining the authentication ac- thentication system. In our previous work [16], we proposed
curacy at a high and stable level, which increases not only a touch gestures-based user authentication scheme on touch-
security but also usability with lower FAR and FRR. screen mobile phones which consisted of 21 touch-gesture
A possible solution to reduce the workload is that the related features. The experimental results with 20 Android
phases of classier training and algorithm selection are only users show that the average error rate is about 3% by means
performed when the phone is not frequently used (i.e., at of a classier of PSO-RBFN.
night). To meet dierent requirements, it is better for users In this work, we propose a lightweight and ecient touch
to set the updating time and frequency. In this work, we in- dynamics-based authentication scheme that consists of only
vestigate the workload of adaptive mechanism and present 8 features to reduce time consumption of data processing,
positive results. Certainly, larger experiments should be and we further design an adaptive mechanism aiming to
conducted to further explore this issue. We leave it as one maintain the authentication accuracy. In addition, this work
of our future work. employs an event-based session instead of a time-based ses-
sion in [16]. These characteristics make our current work
Involved Users. For the behavioral-biometric based au- dierent from our previous one. The experimental results
thentication schemes, involved users are a very important positively show that our proposed authentication scheme can
factor to aect the performance results of the scheme (i.e., achieve an average error rate of 2.46% (where FAR=2.55%,
the generated datasets are dierent). To mitigate this is- FRR=2.37%), which is lower than that in [16].
sue, conducting a larger user study with even more users is
always desirable. In this work, we involved 50 users in the
evaluation. We plan to conduct an even larger study in our 7. CONCLUDING REMARKS
following work to validate the results. With the advent of touchscreen mobile phones, it is be-
coming more and more important to develop user authenti-
cation schemes based on touch dynamics.
6. RELATED WORK In this paper, we propose a new, lightweight and ecient
With the increased popularity of touchscreen mobile de- touch-dynamics-based authentication scheme, which is com-
vices, more research work has been conducted on this plat- posed of only 8 touch-gesture related features, to authenti-
form and focused on touch dynamics recently. For example, cate a user on mobile phones. In addition, we further de-
Numabe et al. [19], presented a nger identication approach sign an adaptive mechanism to select a better classier in
on touch panels. They identied that when tapping a touch authenticating users with the purpose of maintaining the
panel, the exact coordinates of a tap were depending on authentication accuracy. As a study, we implement a cost-
the used ngers. That is, dierent ngers could generate based metric in the adaptive mechanism that enables to se-
slightly dierent coordinates. They called this phenomenon lect the least costly classier for authentication while we
tapping uctuation and mainly used it to make touch input also show that a less costly classier can achieve a better
more versatile, by varying the function executed depending classication accuracy by reducing the information loss dur-
on which nger was used to tap the touchscreen. ing the establishment of classier model. In the evaluation,
Then, Kim et al. [10] exploited the use of multi-touch we involved a total number of 50 participants and collected
to inhibit shoulder surng, with the purpose of enhancing raw data by means of Android phones. The experimental
PIN input (e.g., at an ATM-Automated Teller Machine). results show that our proposed authentication scheme can
In particular, for their schemes, a user begins by placing achieve an average error rate of 2.46% (where FAR=2.55%,
three ngers of each hand on the interface. The system uses FRR=2.37%) by means of a PSO-RBFN classier in au-
the locations of these touch points to dynamically draw the thenticating users, and that the designed adaptive mecha-
grid of objects, and records pressure zones that are assigned nism is capable of maintaining the authentication accuracy
to each nger. Fiorella et al. [4] provided a preliminary at a relatively high and stable level.
study about multi-touch input (e.g., rotation, translation, There are many possible topics for our following stud-
and scaling) for 3D object manipulation on mobile devices. ies. Future work could include conducting an even larger
Their statistic analysis of 27 users on an iPod-touch device user study to validate the obtained results and developing
1686
an application that combines the behavioral-biometric based [12] L. Kottho, I.P. Gent, and I. Miguel, An Evaluation
authentication with the password-based authentication (e.g, of Machine Learning in Algorithm Selection for Search
PIN) to further increase the performance of such a touch- Problems, AI Communications 25(3), 257-270, 2012.
dynamics-based authentication scheme. In addition, future [13] D. Lee, The state of the touch-screen panel market in
2011. (January 2013) Available at:
work could also include investigating the practical workload http://www.walkermobile.com/March_2011_ID_
of our current feature extraction and the designed adaptive State_of_the_Touch_Screen_Market.pdf
mechanism (e.g., actual processing time), and evaluating the [14] McAfee And Carnegie Mellon University. Mobility and
mechanism by means of other possible metrics. Security: Dazzling Opportunities, profound challenges.
May 2011. Available at:
8. ACKNOWLEDGMENTS http://www.mcafee.com/mobilesecurityreport
[15] Y. Meng, Measuring Intelligent False Alarm
We would like to thank all participants for their hard work Reduction Using an ROC Curve-based Approach in
in the process of data collection and all anonymous reviewers Network Intrusion Detection, Proc. the 2012 IEEE
for their helpful comments in improving this paper. International Conference on Computational
Intelligence for Measurement Systems and
Applications (CIMSA), pp. 108-113, 2012.
9. REFERENCES [16] Y. Meng, D.S. Wong, R. Schlegel, and L.-F. Kwok,
[1] F. Bergadano, D. Gunetti and C. Picardi, User
Authentication through Keystroke Dynamics, ACM Touch Gestures Based Biometric Authentication
Transactions on Information and System Security Scheme for Touchscreen Mobile Phones, Proc. the 8th
5(4), 367-397, 2002. China International Conference on Information
[2] N.L. Clarke and S.M. Furnell, Authenticating Mobile Security and Cryptology (INSCRYPT), pp. 331-350,
Phone Users Using Keystroke Analysis, International LNCS, Springer, Heidelberg, 2012.
Journal of Information Security 6(1), 1-14, 2007. [17] Millennial Media. Mobile mix: The mobile device
[3] T. Feng, Z. Liu, K.-A. Kwon, W. Shi, B. Carbunary, index. (2012) Available at:
Y. Jiang, and N. Nguyen, Continuous mobile http://www.millennialmedia.com/research
authentication using touchscreen gestures, Proc. the [18] Mobile and NCSA. Report on Consumer Behaviors
2012 IEEE Conference on Technologies for Homeland and Perceptions of Mobile Security. (January 2012)
Security (HST), pp. 451-456, IEEE, USA, 2012. Available at: http://docs.nq.com/NQ_Mobile_
[4] D. Fiorella, A. Sanna, and F. Lamberti, Multi-touch Security_Survey_Jan2012.pdf
User Interface Evaluation for 3D Object Manipulation [19] Y. Numabe, H. Nonaka, and T. Yoshikawa, Finger
on Mobile Devices, Journal on Multimodal User Identication for Touch Panel Operation using
Interfaces 4(1), 3-10, 2010. Tapping Fluctuation, Proc. the 13th IEEE
[5] M. Frank, R. Biedert, E. Ma, I. Martinovic, and International Symposium on Consumer Electronics,
D. Song, Touchalytics: On the Applicability of pp. 899-902, 2009.
Touchscreen Input as a Behavioral Biometric for [20] R. Potharaju, A. Newell, C. Nita-Rotaru, and
Continuous Authentication, IEEE Transactions on X. Zhang, Plagiarizing Smartphone Applications:
Information Forensics and Security 8(1), 136-148, Attack Strategies and Defense Techniques, Proc. the
2013. 2012 International Symposium on Engineering Secure
[6] J.E. Ganey and J.W. Ulvila, Evaluation of intrusion Software and Systems (ESSoS), pp. 106-120, LNCS,
detectors: A decision theory approach, Proc. of the Springer, Heidelberg, 2012.
2001 IEEE Symposium on Security and Privacy, pp. [21] M. Pusara and C.E. Brodley, User Re-Authentication
50-61, May 2001. via Mouse Movements, Proc. the 2004 ACM
[7] M. Goel, J.O. Wobbrock, and S.N. Patel, GripSense: Workshop on Visualization and Data Mining for
Using Built-In Sensors to Detect Hand Posture and Computer Security (VizSEC/DMSEC), pp. 1-8, ACM,
Pressure on Commodity Mobile Phones, Proc. the New York, USA, 2004.
25th Annual ACM symposium on User Interface [22] H. Saevanee and P. Bhattarakosol, Authenticating
Software and Technology (UIST), pp. 545-554, ACM User Using Keystroke Dynamics and Finger Pressure,
New York, NY, USA, 2012. Proc. the 6th IEEE Conference on Consumer
[8] G. Gu, P. Fogla, W. Lee, and B. Skoric, Measuring Communications and Networking Conference
intrusion detection capability: an (CCNC), pp. 1078-1079, IEEE Press, USA, 2009.
information-theoretic approach, Proc. the 2006 ACM [23] A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici,
Symposium on Information, Computer and S. Dolev, and C. Glezer, Google Android: A
Communications Security (ASIACCS), pp. 90-101, Comprehensive Security Assessment, IEEE Security
ACM New York, NY, USA, 2006. Privacy 8(2), 35-44, March-April 2010.
[9] A.K. Karlson, A.B. Brush, and S. Schechter, Can I [24] Symantec Enterprise: Norton Survey Reveals One in
Borrow Your Phone?: Understanding Concerns When Three Experience Cell Phone Loss, Theft. (February
Sharing Mobile Phones, Proc. the 27th International 2011) Available at:
Conference on Human Factors in Computing Systems http://www.symantec.com/about/news/release/
(CHI), pp. 1647-1650, ACM, New York, USA, 2009. article.jsp?prid=20110208_01
[10] D. Kim, P. Dunphy, P. Briggs, J. Hook, [25] D. Van Thanh, Security Issues in Mobile
J.W. Nicholson, J. Nicholson, and P. Olivier, eCommerce, Proc. the 11th International Workshop
Multi-Touch Authentication on Tabletops, Proc. the on Database and Expert Systems Applications
28th International Conference on Human Factors in (DEXA), pp. 412-425, IEEE, USA, 2000.
Computing Systems (CHI), pp. 1093-1102, ACM, New [26] The University of Waikato. WEKA-Waikato
York, USA, 2010. Environment for Knowledge Analysis. Available at:
[11] J. Koetsier, MobileBeat: Android captured almost http://www.cs.waikato.ac.nz/ml/weka/
70% global smartphone market share in 2012, Apple [27] S. Zahid, M. Shahzad, S.A. Khayam, and M. Farooq,
just under 20%. (January 2013) Available at: Keystroke-based User Identication on Smart
http://venturebeat.com/2013/01/28/android- Phones, Proc. the 12th International Symposium
captured-almost-70-global-smartphone-market- Recent Advances in Intrusion Detection (RAID), pp.
share-in-2012-apple-just-under-20/ 224-243, LNCS, Springer, Heidelberg, 2009.

1687

Das könnte Ihnen auch gefallen