Using Behavioural Biometrics and Machine Learning in Smart Gadgets for Continuous User Authentication Purposes
-
Published:2024-07-05
Issue:
Volume:
Page:616-626
-
ISSN:2788-7669
-
Container-title:Journal of Machine and Computing
-
language:en
-
Short-container-title:JMC
Author:
S Deepthi1, Balachandra Mamatha1, K V Prema2, Yau Kok Lim Alvin3, A K Abhishek2
Affiliation:
1. Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal, Karnataka India. 2. Department of Computer Science and Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, Karnataka India. 3. Lee Kong Chian Faculty of Engineering and Science (LKCFES), Universiti Tunku Abdul Rahman, Sungai Long, Selangor, Malaysia.
Abstract
In the ever-evolving realm of technology, the identification of human activities using intelligent devices such as smartwatches, fitness bands, and smartphones has emerged as a crucial area of study. These devices, equipped with inertial sensors, gather a wealth of data and provide insights into users' movements and behaviors. These data not only serve practical purposes, but also hold significant implications for domains such as healthcare and fitness tracking. Traditionally, these devices have been employed to monitor various health metrics such as step counts, calorie expenditure, and real-time blood pressure monitoring. However, recent research has shifted its focus to leveraging the data collected by these sensors for user authentication purposes. This innovative approach involves the utilization of Machine Learning (ML) models to analyze the routine data captured by sensors in smart devices employing ML algorithms, which can recognize and authenticate users based on their unique movement patterns and behaviors. This introduces a paradigm shift from traditional one-time authentication methods to continuous authentication, adding an extra layer of security to protect users against potential threats. Continuous authentication offers several advantages over its conventional counterparts. First, it enhances security by constantly verifying a user's identity through their interaction with the device, thereby mitigating the risk of unauthorized access. Second, it provides a seamless and nonintrusive user experience, eliminating the need for repetitive authentication prompts. Moreover, it offers robust protection against various threats such as identity theft, unauthorized access, and device tampering. The application of continuous authentication extends beyond individual devices and encompasses interconnected systems and networks. This holistic approach ensures a comprehensive security across digital platforms and services. The experiments demonstrate that the logistic regression model achieves an accuracy of 82.32% on the test dataset, highlighting its robustness for binary classification tasks. Additionally, the random forest model outperforms with a 92.18% accuracy, emphasizing its superior capability in handling complex feature interactions. In the study, the sequential neural network achieved an accuracy of 92% on the HAR dataset, outperforming traditional machine learning models by a significant margin. The model also demonstrated robust generalization capabilities with a minimal drop in performance across various cross-validation folds.
Publisher
Anapub Publications
Reference35 articles.
1. J. Dybczak and P. Nawrocki, “Continuous authentication on mobile devices using behavioral biometrics,” 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), May 2022, doi: 10.1109/ccgrid54584.2022.00125. 2. Z. Shen, S. Li, X. Zhao, and J. Zou, “IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones,” IEEE Internet of Things Journal, vol. 11, no. 1, pp. 1589–1603, Jan. 2024, doi: 10.1109/jiot.2023.3289935. 3. Y. Liang, K. Feng, and Z. Ren, “Human Activity Recognition Based on Transformer via Smart-phone Sensors,” 2023 IEEE 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI), May 2023, doi: 10.1109/ccai57533.2023.10201297. 4. S. Aboukadri, A. Ouaddah, and A. Mezrioui, “Machine learning in identity and access management systems: Survey and deep dive,” Computers & Security, vol. 139, p. 103729, Apr. 2024, doi: 10.1016/j.cose.2024.103729. 5. K. Istiaque Ahmed, M. Tahir, M. Hadi Habaebi, S. Lun Lau, and A. Ahad, “Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction,” Sensors, vol. 21, no. 15, p. 5122, Jul. 2021, doi: 10.3390/s21155122.
|
|