Affiliation:
1. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100786, China
2. Comprehensive Research Center of Electronic Information Technology in the MIIT of China, Weihai 264200, China
3. University of Technology Sydney, Sydney, Australia
Abstract
Since the continuous authentication (CA) system based on smartphone sensors has been facing the challenge of the low-data regime under some practical scenarios, which leads to low accuracy of CA, it needs to be solved urgently. To this end, currently, the generative adversarial networks (GAN) provide a powerful method to train the result generative model that could generate very convincing verisimilar data. The framework of the GAN and its variants shed much light on improving the performance of CA. Therefore, in this article, we propose a continuous authentication system on smartphones based on a Wasserstein generative adversarial network (WGAN) for sensor data augmentation, which utilizes accelerometers, gyroscopes, and magnetometers of smartphone sensors to sense phone movements caused by user operation behavior. Specifically, based on sensor data under different user activities, the WGAN is used to create additional data in training data for data augmentation. With the augmented data, we design a convolutional neural network to learn and extract deep features from sensor data, and then use four classifiers of RF, OCSVM, DT, and KNN to train these features. Finally, we train and test on the HMOG dataset, and the results show that the EER of the authentication system is between 3.68% and 6.39% on the sensor data with a time window of 2 s.
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Information Systems
Reference26 articles.
1. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
2. DeepAuth: a framework for continuous user re-authentication in mobile apps;S. Amini
3. Data Augmentation for Inertial Sensor-Based Gait Deep Neural Network
4. Deepauth: in-situ authentication for smartwatches via deeply learned behavioural biometrics;C. X. Lu
5. Deepauth: a framework for continuous user re-authentication in mobile apps;S. Amini
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献