Identifying Smartphone Users Based on Activities in Daily Living Using Deep Neural Networks

Author:

Mekruksavanich Sakorn1ORCID,Jitpattanakul Anuchit23ORCID

Affiliation:

1. Department of Computer Engineering, School of Information and Communication Technology, University of Phayao, Phayao 56000, Thailand

2. Department of Mathematics, Faculty of Applied Science, King Mongkut’s University of Technology North Bangkok, Bangkok 10800, Thailand

3. Intelligent and Nonlinear Dynamic Innovations Research Center, Science and Technology Research Institute, King Mongkut’s University of Technology North Bangkok, Bangkok 10800, Thailand

Abstract

Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individuals store sensitive data on their devices like financial credentials and personal information due to the convenience and accessibility. However, losing control of this data poses risks if the phone gets lost or stolen. While passwords, PINs, and pattern locks are common security methods, they can still be compromised through exploits like smudging residue from touching the screen. This research explored leveraging smartphone sensors to authenticate users based on behavioral patterns when operating the device. The proposed technique uses a deep learning model called DeepResNeXt, a type of deep residual network, to accurately identify smartphone owners through sensor data efficiently. Publicly available smartphone datasets were used to train the suggested model and other state-of-the-art networks to conduct user recognition. Multiple experiments validated the effectiveness of this framework, surpassing previous benchmark models in this area with a top F1-score of 98.96%.

Funder

Thailand Science Research and Innovation Fund

University of Phayao

National Science, Research and Innovation Fund

King Mongkut’s University of Technology North Bangkok

Publisher

MDPI AG

Reference24 articles.

1. Location spoofing attack detection with pre-installed sensors in mobile devices;Wong;J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.,2020

2. Frik, A., Kim, J., Sanchez, J.R., and Ma, J. (2022, January 29). Users’ Expectations About and Use of Smartphone Privacy and Security Settings. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New York, NY, USA. CHI ’22.

3. Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC;Nowaczewski;J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.,2020

4. Recent advances in biometrics-based user authentication for wearable devices: A contemporary survey;Liu;Digit. Signal Process.,2022

5. Wang, Y., Zhang, X., and Hu, H. (2023). Continuous User Authentication on Multiple Smart Devices. Information, 14.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3