AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning

The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenarios – such as Smart Offices – where continuous authentication is still an open challenge. The paper at hand, proposes an AI-based, privacy-preserving and multi-device continuous authentication architecture called AuthCODE. A realistic Smart Office scenario with several users, interacting with their mobile devices and personal computer, has been used to create a set of single- and multi-device behavioural datasets and validate AuthCODE. A pool of experiments with machine and deep learning classifiers measured the impact of time in authentication accuracy and improved the results of single-device approaches by considering multi-device behaviour profiles. The f1-score average reached for XGBoost on multi-device profiles based on 1-minute windows was 99.33 single devices was lower than 97.39 the form of vector sequences classified by a Long-Short Term Memory Network, allowed the identification of additional complex behaviour patterns associated to each user, resulting in an average f1-score of 99.02 long-term behaviours.

READ FULL TEXT

page 1

page 7

page 8

page 11

research
12/22/2017

An HMM-based Multi-sensor Approach for Continuous Mobile Authentication

With the increased popularity of smart phones, there is a greater need t...
research
09/14/2022

A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication

Continuous authentication utilizes automatic recognition of certain user...
research
05/20/2021

Computer Users Have Unique Yet Temporally Inconsistent Computer Usage Profiles

This paper investigates whether computer usage profiles comprised of pro...
research
09/09/2020

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...
research
06/06/2022

BehavePassDB: Benchmarking Mobile Behavioral Biometrics

Mobile behavioral biometrics have become a popular topic of research, re...
research
10/05/2018

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices

Users with limited use of their hands, such as people suffering from dis...
research
10/07/2021

Data-driven behavioural biometrics for continuous and adaptive user verification using Smartphone and Smartwatch

Recent studies have shown how motion-based biometrics can be used as a f...

Please sign up or login with your details

Forgot password? Click here to reset