Touch events and human activities for continuous authentication via smartphone
- PMID: 37386093
- PMCID: PMC10310780
- DOI: 10.1038/s41598-023-36780-3
Touch events and human activities for continuous authentication via smartphone
Abstract
The security of modern smartphones is related to the combination of Continuous Authentication approaches, Touch events, and Human Activities. The approaches of Continuous Authentication, Touch Events, and Human Activities are silent to the user but are a great source of data for Machine Learning Algorithms. This work aims to develop a method for continuous authentication while the user is sitting and scrolling documents on the smartphone. Touch Events and Smartphone Sensor Features (from the well-known H-MOG Dataset) were used with the addition, for each sensor, of the feature called Signal Vector Magnitude. Several Machine Learning Models have been considered with different experiment setups, 1-class, and 2-class, for evaluation. The results show that the 1-class SVM achieves an accuracy of 98.9% and an F1-score of 99.4%, considering the selected features and the feature Signal Vector Magnitude very significant.
© 2023. The Author(s).
Conflict of interest statement
The authors declare no competing interests.
Figures
References
-
- Shaikh FB, Rehman M, Amin A. Cyberbullying: A systematic literature review to identify the factors impelling university students towards cyberbullying. IEEE Access. 2020;8:148031–148051. doi: 10.1109/ACCESS.2020.3015669. - DOI
-
- Gattulli V, Impedovo D, Pirlo G, Sarcinella L. Human activity recognition for the identification of bullying and cyberbullying using smartphone sensors. Electronics. 2023;12:261. doi: 10.3390/electronics12020261. - DOI
-
- Zhu, J., Wu, P., Wang, X., Zhang, J. SenSec: Mobile security through passive sensing. In 2013 International Conference on Computing, Networking and Communications, ICNC 2013 1128–1133 (2013) doi:10.1109/ICCNC.2013.6504251.
-
- Lee, W.-H., Lee, R. Multi-sensor authentication to improve smartphone security. In International Conference on Information Systems Security and Privacy (2017).
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources