Author:
Gattulli Vincenzo,Impedovo Donato,Pirlo Giuseppe,Volpe Francesco
Abstract
AbstractThe security of modern smartphones is related to the combination of Continuous Authentication approaches, Touch events, and Human Activities. The approaches of Continuous Authentication, Touch Events, and Human Activities are silent to the user but are a great source of data for Machine Learning Algorithms. This work aims to develop a method for continuous authentication while the user is sitting and scrolling documents on the smartphone. Touch Events and Smartphone Sensor Features (from the well-known H-MOG Dataset) were used with the addition, for each sensor, of the feature called Signal Vector Magnitude. Several Machine Learning Models have been considered with different experiment setups, 1-class, and 2-class, for evaluation. The results show that the 1-class SVM achieves an accuracy of 98.9% and an F1-score of 99.4%, considering the selected features and the feature Signal Vector Magnitude very significant.
Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Shaikh, F. B., Rehman, M. & Amin, A. Cyberbullying: A systematic literature review to identify the factors impelling university students towards cyberbullying. IEEE Access 8, 148031–148051 (2020).
2. Gattulli, V., Impedovo, D., Pirlo, G. & Sarcinella, L. Human activity recognition for the identification of bullying and cyberbullying using smartphone sensors. Electronics 12, 261 (2023).
3. Islam, M., Nooruddin, S., Karray, F. & Muhammad, G. Human activity recognition using tools of convolutional neural networks: A state of the art review, data sets, challenges and future prospects. Comput. Biol. Med. 149, 106060 (2022).
4. Zhu, J., Wu, P., Wang, X., Zhang, J. SenSec: Mobile security through passive sensing. In 2013 International Conference on Computing, Networking and Communications, ICNC 2013 1128–1133 (2013) doi:https://doi.org/10.1109/ICCNC.2013.6504251.
5. Lee, W.-H., Lee, R. Multi-sensor authentication to improve smartphone security. In International Conference on Information Systems Security and Privacy (2017).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Two-factor authentication by combining PIN and biometrics Touch Dynamics;2023 10th International Conference on Behavioural and Social Computing (BESC);2023-10-30