Ahmed Mahfouz , Ahmed Hamdy , Mohamed Alaa Eldin , Tarek M. Mahmoud
{"title":"B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment","authors":"Ahmed Mahfouz , Ahmed Hamdy , Mohamed Alaa Eldin , Tarek M. Mahmoud","doi":"10.1016/j.pmcj.2024.101888","DOIUrl":null,"url":null,"abstract":"<div><p>Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately, it is not clear how these frameworks perform in the real world deployment and most of the experiments in the literature have been conducted with cooperative users in a controlled environment. In this paper, we present a novel behavioral biometric authentication framework, called B2auth, designed specifically for smartphone users. The framework leverages raw data collected from touchscreen on smartphone to extract behavioral traits for authentication. A Multilayer Perceptron (MLP) neural network is employed to develop authentication models. Unlike many existing experiments conducted in controlled environments with cooperative users, we focused on real-world deployment scenarios, collecting data from 60 participants using smartphones in an uncontrolled environment. The framework achieves promising results in differentiating the legitimate owner and an attacker across various app contexts, showcasing its potential in practical use cases. By utilizing minimalist data collection and cloud-based model generation, the B2auth framework offers an efficient and effective approach to behavioral biometric authentication for smartphones.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"99 ","pages":"Article 101888"},"PeriodicalIF":3.0000,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pervasive and Mobile Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574119224000142","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately, it is not clear how these frameworks perform in the real world deployment and most of the experiments in the literature have been conducted with cooperative users in a controlled environment. In this paper, we present a novel behavioral biometric authentication framework, called B2auth, designed specifically for smartphone users. The framework leverages raw data collected from touchscreen on smartphone to extract behavioral traits for authentication. A Multilayer Perceptron (MLP) neural network is employed to develop authentication models. Unlike many existing experiments conducted in controlled environments with cooperative users, we focused on real-world deployment scenarios, collecting data from 60 participants using smartphones in an uncontrolled environment. The framework achieves promising results in differentiating the legitimate owner and an attacker across various app contexts, showcasing its potential in practical use cases. By utilizing minimalist data collection and cloud-based model generation, the B2auth framework offers an efficient and effective approach to behavioral biometric authentication for smartphones.
期刊介绍:
As envisioned by Mark Weiser as early as 1991, pervasive computing systems and services have truly become integral parts of our daily lives. Tremendous developments in a multitude of technologies ranging from personalized and embedded smart devices (e.g., smartphones, sensors, wearables, IoTs, etc.) to ubiquitous connectivity, via a variety of wireless mobile communications and cognitive networking infrastructures, to advanced computing techniques (including edge, fog and cloud) and user-friendly middleware services and platforms have significantly contributed to the unprecedented advances in pervasive and mobile computing. Cutting-edge applications and paradigms have evolved, such as cyber-physical systems and smart environments (e.g., smart city, smart energy, smart transportation, smart healthcare, etc.) that also involve human in the loop through social interactions and participatory and/or mobile crowd sensing, for example. The goal of pervasive computing systems is to improve human experience and quality of life, without explicit awareness of the underlying communications and computing technologies.
The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems.