Journal of Machine and Computing


Using Behavioural Biometrics and Machine Learning in Smart Gadgets for Continuous User Authentication



Journal of Machine and Computing

Received On : 10 January 2024

Revised On : 22 March 2024

Accepted On : 06 June 2024

Published On : 05 July 2024

Volume 04, Issue 03

Pages : 616-626


Abstract


In the ever-evolving realm of technology, the identification of human activities using intelligent devices such as smartwatches, fitness bands, and smartphones has emerged as a crucial area of study. These devices, equipped with inertial sensors, gather a wealth of data and provide insights into users' movements and behaviors. These data not only serve practical purposes, but also hold significant implications for domains such as healthcare and fitness tracking. Traditionally, these devices have been employed to monitor various health metrics such as step counts, calorie expenditure, and real-time blood pressure monitoring. However, recent research has shifted its focus to leveraging the data collected by these sensors for user authentication purposes. This innovative approach involves the utilization of Machine Learning (ML) models to analyze the routine data captured by sensors in smart devices employing ML algorithms, which can recognize and authenticate users based on their unique movement patterns and behaviors. This introduces a paradigm shift from traditional one-time authentication methods to continuous authentication, adding an extra layer of security to protect users against potential threats. Continuous authentication offers several advantages over its conventional counterparts. First, it enhances security by constantly verifying a user's identity through their interaction with the device, thereby mitigating the risk of unauthorized access. Second, it provides a seamless and nonintrusive user experience, eliminating the need for repetitive authentication prompts. Moreover, it offers robust protection against various threats such as identity theft, unauthorized access, and device tampering. The application of continuous authentication extends beyond individual devices and encompasses interconnected systems and networks. This holistic approach ensures a comprehensive security across digital platforms and services. The experiments demonstrate that the logistic regression model achieves an accuracy of 82.32% on the test dataset, highlighting its robustness for binary classification tasks. Additionally, the random forest model outperforms with a 92.18% accuracy, emphasizing its superior capability in handling complex feature interactions. In the study, the sequential neural network achieved an accuracy of 92% on the HAR dataset, outperforming traditional machine learning models by a significant margin. The model also demonstrated robust generalization capabilities with a minimal drop in performance across various cross-validation folds.


Keywords


User Authentication, Smartphone, Machine Learning, Behavioral Biometric, Human Activity Recognition.


  1. J. Dybczak and P. Nawrocki, “Continuous authentication on mobile devices using behavioral biometrics,” 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), May 2022, doi: 10.1109/ccgrid54584.2022.00125.
  2. Z. Shen, S. Li, X. Zhao, and J. Zou, “IncreAuth: Incremental-Learning-Based Behavioral Biometric Authentication on Smartphones,” IEEE Internet of Things Journal, vol. 11, no. 1, pp. 1589–1603, Jan. 2024, doi: 10.1109/jiot.2023.3289935.
  3. Y. Liang, K. Feng, and Z. Ren, “Human Activity Recognition Based on Transformer via Smart-phone Sensors,” 2023 IEEE 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI), May 2023, doi: 10.1109/ccai57533.2023.10201297.
  4. S. Aboukadri, A. Ouaddah, and A. Mezrioui, “Machine learning in identity and access management systems: Survey and deep dive,” Computers & Security, vol. 139, p. 103729, Apr. 2024, doi: 10.1016/j.cose.2024.103729.
  5. K. Istiaque Ahmed, M. Tahir, M. Hadi Habaebi, S. Lun Lau, and A. Ahad, “Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction,” Sensors, vol. 21, no. 15, p. 5122, Jul. 2021, doi: 10.3390/s21155122.
  6. J. Lin and M. E. Latoschik, “Digital body, identity and privacy in social virtual reality: A systematic review,” Frontiers in Virtual Reality, vol. 3, Nov. 2022, doi: 10.3389/frvir.2022.974652.
  7. X. Wang, Y. Shi, K. Zheng, Y. Zhang, W. Hong, and S. Cao, “User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes,” Sensors, vol. 22, no. 17, p. 6627, Sep. 2022, doi: 10.3390/s22176627.
  8. A. F. Baig, S. Eskeland, and B. Yang, “Privacy-preserving continuous authentication using behavioral biometrics,” International Journal of Information Security, vol. 22, no. 6, pp. 1833–1847, Jul. 2023, doi: 10.1007/s10207-023-00721-y.
  9. D. R. Bhuva and S. Kumar, “A novel continuous authentication method using biometrics for IOT devices,” Internet of Things, vol. 24, p. 100927, Dec. 2023, doi: 10.1016/j.iot.2023.100927.
  10. Z. A. Zukarnain, A. Muneer, and M. K. Ab Aziz, “Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges,” Symmetry, vol. 14, no. 4, p. 821, Apr. 2022, doi: 10.3390/sym14040821.
  11. S. Kokal, M. Vanamala, and R. Dave, “Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication,” Journal of Cybersecurity and Privacy, vol. 3, no. 2, pp. 227–258, Jun. 2023, doi: 10.3390/jcp3020013.
  12. P. William, G. R. Lanke, D. Bordoloi, A. Shrivastava, A. P. Srivastavaa, and S. V. Deshmukh, “Assessment of Human Activity Recognition based on Impact of Feature Extraction Prediction Accuracy,” 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), May 2023, doi: 10.1109/iciem59379.2023.10166247.
  13. P. Ganesh, P. Jagadeesh, and J. S. Raj. J, “Prediction of Human Activity Recognition Using Convolution Neural Network Algorithm in Comparison with Grid Search Algorithm,” 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), May 2023, doi: 10.1109/accai58221.2023.10200427.
  14. S. Mekruksavanich, P. Jantawong, and A. Jitpattanakul, “Comparative Analysis of CNN-based Deep Learning Approaches on Complex Activity Recognition,” 2022 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON), Jan. 2022, doi: 10.1109/ectidamtncon53731.2022.9720320.
  15. S. Zou, H. Sun, G. Xu, C. Wang, X. Zhang, and R. Quan, “A Robust Continuous Authentication System Using Smartphone Sensors and Wasserstein Generative Adversarial Networks,” Security and Communication Networks, vol. 2023, pp. 1–11, Apr. 2023, doi: 10.1155/2023/3673113.
  16. M. Hu, K. Zhang, R. You, and B. Tu, “Multisensor-Based Continuous Authentication of Smartphone Users With Two-Stage Feature Extraction,” IEEE Internet of Things Journal, vol. 10, no. 6, pp. 4708–4724, Mar. 2023, doi: 10.1109/jiot.2022.3219135.
  17. K. Wagata and A. B. J. Teoh, “Few-Shot Continuous Authentication for Mobile-Based Biometrics,” Applied Sciences, vol. 12, no. 20, p. 10365, Oct. 2022, doi: 10.3390/app122010365.
  18. S. Buddhacharya and N. Awale, “CNN-BASED CONTINUOUS AUTHENTICATION OF SMARTPHONES USING MOBILE SENSORS,” International Journal of Innovative Research in Advanced Engineering, vol. 9, no. 8, pp. 361–369, Aug. 2022, doi: 10.26562/ijirae.2022.v0908.37.
  19. P. K. Rayani and S. Changder, “Enhanced Unimodal Continuous Authentication Architecture on Smartphones for User Identification through Behavioral Biometrics,” 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), May 2023, doi: 10.1109/vitecon58111.2023.10157803.
  20. S. Mekruksavanich and A. Jitpattanakul, “Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing,” Sensors, vol. 21, no. 22, p. 7519, Nov. 2021, doi: 10.3390/s21227519.
  21. A. H and A. R, “Artificial Intelligence and Machine Learning for Enterprise Management,” 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), Nov. 2019, doi: 10.1109/icssit46314.2019.8987964.
  22. Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra and Jorge L. Reyes-Ortiz. “A Public Domain Dataset for Human Activity Recognition Using Smartphones”,21th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2013. Bruges, Belgium 24-26 April 2013.
  23. L. de-Marcos, J.-J. Martínez-Herráiz, J. Junquera-Sánchez, C. Cilleruelo, and C. Pages-Arévalo, “Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics,” Electronics, vol. 10, no. 14, p. 1622, Jul. 2021, doi: 10.3390/electronics10141622.
  24. B. Pelto, M. Vanamala, and R. Dave, “Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics,” 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Jul. 2023, doi: 10.1109/iceccme57830.2023.10252828.
  25. E. Klieme and C. Meinel, “All about that BASE: Modeling Biometric Authentication Systems and their Evaluations to enable a more efficient Exchange of Research Results,” 2023 IEEE International Joint Conference on Biometrics (IJCB), Sep. 2023, doi: 10.1109/ijcb57857.2023.10448589.
  26. S. Zou, H. Sun, G. Xu, C. Wang, X. Zhang, and R. Quan, “A Robust Continuous Authentication System Using Smartphone Sensors and Wasserstein Generative Adversarial Networks,” Security and Communication Networks, vol. 2023, pp. 1–11, Apr. 2023, doi: 10.1155/2023/3673113.
  27. K. Gorur, “Fourier Synchrosqueezing Transform-ICA-EMD Framework Based EOG-Biometric Sustainable and Continuous Authentication via Voluntary Eye Blinking Activities,” Biomimetics, vol. 8, no. 4, p. 378, Aug. 2023, doi: 10.3390/biomimetics8040378.
  28. P. K. Rayani and S. Changder, “Continuous user authentication on smartphone via behavioral biometrics: a survey,” Multimedia Tools and Applications, vol. 82, no. 2, pp. 1633–1667, Jun. 2022, doi: 10.1007/s11042-022-13245-9.
  29. M. Hu, K. Zhang, R. You, and B. Tu, “AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer,” Computers & Security, vol. 127, p. 103122, Apr. 2023, doi: 10.1016/j.cose.2023.103122.
  30. U. Uslu, Ö. D. İncel, and G. I. Alptekin, “Evaluation of Deep Learning Models for Continuous Authentication Using Behavioral Biometrics,” Procedia Computer Science, vol. 225, pp. 1272–1281, 2023, doi: 10.1016/j.procs.2023.10.115.
  31. Hyung-dong Lee, KiHyo Nam, Heewoong Lee, and Mun-Kweon Jeong, “PC-based User Continuous Authentication System Using the User’s Finger Stroke Characteristics,” Research Briefs on Information and Communication Technology Evolution, vol. 9, pp. 160–177, Nov. 2023, doi: 10.56801/rebicte.v9i.173.
  32. P. Bansal and A. Ouda, “Continuous Authentication in the Digital Age: An Analysis of Reinforcement Learning and Behavioral Biometrics,” Jun. 2023, doi: 10.20944/preprints202306.1005.v1.
  33. S. B. Kulkarni and S. Kulkarni, “Study of the Value of π Probability Sampling by Testing Hypothesis and Experimentally,” Journal of Computers, Mechanical and Management, vol. 3, no. 1, pp. 22–29, Feb. 2024, doi: 10.57159/gadl.jcmm.3.1.240101.
  34. N. Ranjan, “Enhancing Voting Security and Efficiency,” Journal of Computers, Mechanical and Management, vol. 2, no. 3, pp. 9–15, Aug. 2023, doi: 10.57159/gadl.jcmm.2.3.23065.
  35. S. Kumar, U. Gupta, A. K. Singh, and A. K. Singh, “Artificial Intelligence,” Journal of Computers, Mechanical and Management, vol. 2, no. 3, pp. 31–42, Aug. 2023, doi: 10.57159/gadl.jcmm.2.3.23064.

Acknowledgements


The authors would like to thank to the reviewers for nice comments on the manuscript.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Deepthi S, Mamatha Balachandra, Prema K V, Kok Lim Alvin Yau and Abhishek A K, “Using Behavioural Biometrics and Machine Learning in Smart Gadgets for Continuous User Authentication”, Journal of Machine and Computing, pp. 616-626, July 2024. doi: 10.53759/7669/jmc202404059.


Copyright


© 2024 Deepthi S, Mamatha Balachandra, Prema K V, Kok Lim Alvin Yau and Abhishek A K. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.