{"title":"Continuous User Authentication in Smartphones Using Gait Analysis","authors":"M. P. Mufandaidza, T. D. Ramotsoela, G. Hancke","doi":"10.1109/IECON.2018.8591193","DOIUrl":null,"url":null,"abstract":"This paper presents the development a smartphone user authentication system which takes advantage of the device's pre-existing hardware. The authentication was based on a smartphone user's gait pattern which is a biometric feature. If the authentication outcome is positive the authentication process continues uninterrupted in the background. If the authentication fails, the device's location information should be sent to a predetermined email address to notify the authorized user of the device's whereabouts. While the performance of the proposed scheme is promising, it does need to be improved in order for the system to become practically viable.","PeriodicalId":370319,"journal":{"name":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IECON.2018.8591193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
This paper presents the development a smartphone user authentication system which takes advantage of the device's pre-existing hardware. The authentication was based on a smartphone user's gait pattern which is a biometric feature. If the authentication outcome is positive the authentication process continues uninterrupted in the background. If the authentication fails, the device's location information should be sent to a predetermined email address to notify the authorized user of the device's whereabouts. While the performance of the proposed scheme is promising, it does need to be improved in order for the system to become practically viable.