Using associative classification to authenticate mobile device users
- 1 October 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2017 IEEE International Joint Conference on Biometrics (IJCB)
Abstract
Because passwords and personal identification numbers are easily forgotten, stolen, or reused on multiple accounts, the current norm for mobile device security is quickly becoming inefficient and inconvenient. Thus, manufacturers have worked to make physiological biometrics accessible to mobile device owners as improved security measures. While behavioral biometrics has yet to receive commercial attention, researchers have continued to consider these approaches as well. However, studies of interactive data are limited, and efforts which are aimed at improving the performance of such techniques remain relevant. Thus, this paper provides a performance analysis of application, Bluetooth, and Wi-Fi data collected from 189 subjects on a mobile device for user verification. Results indicate that user authentication can be achieved with up to 91% accuracy, demonstrating the effectiveness of associative classification as a feature extraction technique.Keywords
This publication has 24 references indexed in Scilit:
- Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gesturesInternational Journal of Human-Computer Studies, 2016
- Keystroke Dynamics for Mobile Phones: A SurveyIndian Journal of Science and Technology, 2016
- Touch to Authenticate — Continuous Biometric Authentication on Mobile DevicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Anomaly Detection for Mobile Device ComfortIFIP Advances in Information and Communication Technology, 2014
- Continuous mobile authentication using touchscreen gesturesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- I've got 99 problems, but vibration ain't onePublished by Association for Computing Machinery (ACM) ,2012
- Classification Based on Predictive Association Rules of Incomplete DataIEICE Transactions on Information and Systems, 2012
- Simple Algorithms for Frequent Item Set MiningPublished by Springer Science and Business Media LLC ,2010
- Authenticating User Using Keystroke Dynamics and Finger PressurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- A review of associative classification miningThe Knowledge Engineering Review, 2007