Abstract
This paper presents two methods of implicit authentication during answering an incoming call based on user behavior biometrics. Such methods allow to increase usability of authentication against common PIN or graphical password. Also, a concept of authentication system based on presented methods is proposed. The paper shows that user’s touch dynamics and movement of the hand towards the ear when accepting the call provide all necessary information for authentication and there is no need for user to enter a PIN or graphical password.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Consumer Reports. http://www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm. Accessed 25 Apr 2018
Smith, R.E.: Authentication: From Passwords to Public Keys. Williams Publishing House, Moscow (2002)
Løge, M.D.: Tell Me Who You Are and I Will Tell You Your Unlock Pattern. Master of Science in Computer Science, Norwegian University of Science and Technology (2015)
Eremin, A., Kogos, K.: Incoming call implicit user authentication - user authentication via hand movement pattern. In: Proceedings of 4th International Conference on Information Systems Security and Privacy, pp. 24–29. SCITEPRESS, Portugal (2018)
Feng, T., et al.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE Conference on Technologies for Homeland Security, pp. 12–18. IEEE, USA (2012)
Meng, Y., Wong, D.S., Schlegel, R., Kwok, L.: Touch gestures based biometric authentication scheme for touchscreen mobile phones. In: Kutyłowski, M., Yung, M. (eds.) Information Security and Cryptology. LNCS, vol. 7763. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38519-3_21
Maghsoudi, J., Tappert, C.: A behavioral biometrics user authentication study using motion data from android smartphones. In: Proceedings of European Intelligence and Security Informatics Conference, pp. 184–187. IEEE, Sweden (2016)
Conti, M., Zachia-Zlatea, I., Crispo, B.: Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 249–259. ACM, China (2011)
Buriro, A., Crispo, B., Zhauniarovich, Y.: Please hold on: unobtrusive user authentication using smartphone’s built-in sensors. In: Proceedings of IEEE International Conference on Identity, Security and Behavior Analysis, pp. 1–8. IEEE, India (2017)
Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. Trans. Inf. Forensic. Secur. 8(1), 136–148 (2013)
Hempstalk, K., Frank, E., Witten, I.H.: One-class classification by combining density and class probability estimation. In: Daelemans, W., Goethals, B., Morik, K. (eds.) Machine Learning and Knowledge Discovery in Databases. LNCS, vol. 5211. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-87479-9_51
Android: Developers Homepage. https://developer.android.com/reference/android/telep-hony/PhoneStateListener.html. Accessed 29 Apr 2018
Acknowledgements
This work was supported by Competitiveness Growth Program of the Federal Autonomous Educational Institution of Higher Professional Education National Research Nuclear University MEPhI (Moscow Engineering Physics Institute).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Eremin, A., Kogos, K., Valatskayte, Y. (2019). Touch and Move: Incoming Call User Authentication. In: Mori, P., Furnell, S., Camp, O. (eds) Information Systems Security and Privacy. ICISSP 2018. Communications in Computer and Information Science, vol 977. Springer, Cham. https://doi.org/10.1007/978-3-030-25109-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-25109-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-25108-6
Online ISBN: 978-3-030-25109-3
eBook Packages: Computer ScienceComputer Science (R0)