Adaptive threshold scheme for touchscreen gesture continuous authentication using sensor trust

Smith-Creasey, M. & Rajarajan, M. (2017). Adaptive threshold scheme for touchscreen gesture continuous authentication using sensor trust. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 554-561. doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.284

[img]
Preview
Text - Accepted Version
Download (436kB) | Preview

Abstract

In this study we produce a continuous authentication scheme for mobile devices that adjusts an adaptive threshold for touchscreen interactions based on trust in passively collected sensor data. Our framework unobtrusively compares real-time sensor data of a user to historic data and adjusts a trust parameter based on the similarity. We show that the trust parameter can be used to adjust an adaptive threshold in continuous authentication schemes. The framework passively models temporal, spatial and activity scenarios using sensor data such as location, surrounding devices, wi-fi networks, ambient noise, movements, user activity, ambient light, proximity to objects and atmospheric pressure from study participants. Deviations from the models increases the level of threat the device perceives from the scenario. We also model the user touchscreen interactions. The touchscreen interactions are authenticated against a threshold that is continually adjusted based on the perceived trust. This scheme provides greater nuance between security and usability, enabling more refined decisions. We present our novel framework and threshold adjustment criteria and validate our framework on two state-of-the-art sensor datasets. Our framework more than halves the false acceptance and false rejection rates of a static threshold system.

Item Type: Article
Additional Information: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: Continuous authentication, intrusion detection, trust, biometrics
Divisions: School of Engineering & Mathematical Sciences > Engineering
URI: http://openaccess.city.ac.uk/id/eprint/18631

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics