Skip to main content

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System

  • Conference paper
  • First Online:
Smart City and Informatization (iSCI 2019)

Abstract

Smart Offices promise the improvement of working conditions in terms of efficiency, productivity and facility. However, new cybersecurity challenges arise associated with the new capabilities of Smart Cities. One of the key challenges is the utilisation of continuous and non-invasive authentication mechanisms since traditional authentication methods have important limitations. Thus, to cover these limitations, the main contribution of this paper is the design and deployment of a continuous and intelligent authentication architecture oriented to Smart Offices. The architecture is oriented to the cloud computing paradigm and considers Machine Learning techniques to authenticate users according to their behaviours. Some experiments demonstrated the suitability of the proposed solution when recognising and authenticating different users using a classification algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suzuki, L.R.: Smart cities IoT: enablers and technology road map. In: Rassia, S.T., Pardalos, P.M. (eds.) Smart City Networks. SOIA, vol. 125, pp. 167–190. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61313-0_10

    Chapter  Google Scholar 

  2. Almalki, S., Chatterjee, P., Roy, K.: Continuous authentication using mouse clickstream data analysis. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 76–85. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_6

    Chapter  Google Scholar 

  3. Fridman, L., et al.: Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 41, 142–156 (2015)

    Article  Google Scholar 

  4. Montgomery, M., Chatterjee, P., Jenkins, J., Roy, K.: Touch analysis: an empirical evaluation of machine learning classification algorithms on touch data. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 147–156. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_12

    Chapter  Google Scholar 

  5. Jorquera Valero, J.M., et al.: Improving the security and QoE in mobile devices through an intelligent and adaptive continuous authentication system. Sensors 18, 3769 (2018)

    Article  Google Scholar 

  6. Bo, C., Zhang, L., Li, X.: SilentSense: Silent User Identification via Dynamics of Touch and Movement Behavioral Biometrics. CoRR, pp. 187–190 (2013)

    Google Scholar 

  7. Patel, V.M., Chellappa, R., Chandra, D., Barbello, B.: Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33, 49–61 (2016)

    Article  Google Scholar 

  8. Ehatisham-ul Haq, M., et al.: Authentication of smartphone users based on activity recognition and mobile sensing. Sensors 17, 2043 (2017)

    Article  Google Scholar 

  9. Deutschmann, I., Lindholm, J.: Behavioral biometrics for DARPA’s active authentication program. In: International Conference of the BIOSIG Special Interest Group (BIOSIG). Darmstadt, vol. 2013, pp. 1–8 (2013)

    Google Scholar 

  10. Aljohani, O., Aljohani, N., Bours, P., Alsolami, F.: Continuous authentication on PCs using artificial immune system. In: 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). https://doi.org/10.1109/cais.2018.8442022

  11. Dasgupta, D.: An Overview of Artificial Immune Systems and Their Applications. Springer, Heidelberg (1999). https://doi.org/10.1007/978-3-642-59901-9

    Book  MATH  Google Scholar 

  12. Mondal, S., Bours, P.: A study on continuous authentication using a combination of keystroke and mouse biometrics. Neurocomputing 230, 1–22 (2017). https://doi.org/10.1016/j.neucom.2016.11.031. ISSN 0925–2312

    Article  Google Scholar 

  13. Ashibani, Y., Kauling, D., Mahmoud, Q.H.: Design and implementation of a contextual-based continuous authentication framework for smart homes. Appl. Syst. Innov. 2, 4 (2019)

    Article  Google Scholar 

  14. Nespoli, P., et al.: PALOT: profiling and authenticating users leveraging internet of things. Sensors 19, 2832 (2019)

    Article  Google Scholar 

  15. Operating System Market Share. Stat Counter. http://gs.statcounter.com/os-market-share/. Accessed 23 June 2019

  16. Python to exe, Python Library. http://www.py2exe.org/. Accessed 22 June 2019

  17. pynput, Python Library. https://pypi.org/project/pynput/. Accessed 22 June 2019

  18. psutil, Python Library. https://pypi.org/project/psutil/. Accessed 22 June 2019

  19. pywin32, Python Library. https://pypi.org/project/pywin32/. Accessed 22 June 2019

  20. Android Developers, Android Library. https://developer.android.com. Accessed 26 June 2019

  21. Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning - ICML 2006. https://doi.org/10.1145/1143844.1143865

  22. Scikit-learn: Machine Learning in Python, Python Library. https://scikit-learn.org/stable/. Accessed 19 June 2019

  23. Python Data Analysis Library, Python Library. https://pandas.pydata.org/. Accessed 23 June 2019

Download references

Acknowledgment

This work has been partially supported by the Irish Research Council, under the government of Ireland post-doc fellowship (grant code GOIPD/2018/466). Special thanks to all those voluntaries who installed the client applications: Oscar Fernández, Pedro A. Sánchez, Francisco J. Sánchez, Pantaleone Nespoli, Mattia Zago, Sergio López, Manuel Gil, José M. Jorquera and Gregorio Martínez.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pedro Miguel Sánchez Sánchez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sánchez Sánchez, P.M., Huertas Celdrán, A., Fernández Maimó, L., Martínez Pérez, G., Wang, G. (2019). Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1301-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1300-8

  • Online ISBN: 978-981-15-1301-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics