Abstract
Identity verification on ubiquitous input devices is a major concern to validate end-users, because of mobility of the devices. User device interaction (UDI) is capable to capture end-users’ behavioral nature from their device usage pattern. The primary goal of this paper is to collect heterogeneous parameters of usage patterns from any device and build personal profile with good-recognition capability. This work mainly focuses on finding multiple features captured from the usage of smart devices; so that parameters could be used to compose hybrid profile to verify end- users accurately. In this paper, U-Stroke modeling is proposed to capture behavioral data mainly from smart input devices in ubiquitous environment. In addition to this, concept of CCDA (capture, checking, decision, and action) model is proposed to process U-Stroke data efficiently to verify end-user’s identity. This proposal can draw attention of many researchers working on this domain to extend their research towards this direction.
Chapter PDF
Similar content being viewed by others
References
Ballagas, R., Borchers, J., Rohs, M., Sheridan, J.G.: The smart phone: a ubiquitous input device. IEEE Journal of Pervasive Computing 5(1), 70–77 (2006)
Bhattasali, T., Saeed, K., Chaki, N., Chaki, R.: Bio-authentication for layered remote health monitor framework. Journal of Medical Informatics & Technologies 23, 131–140 (2014)
Maxion, R., Killourhy, K.: Keystroke biometrics with number-pad input. In: Proceedings of IEEE International Conference on Dependable Systems & Networks, pp. 201–210 (2010)
Xu, H., Zhou, Y., Lyu, M.R.: Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones. In: Proceedings of Symposium on Usable Privacy and Security, pp. 187–198 (2014)
Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures – you can see it but you cannot do it. In: Proceedings of International Conference on Mobile Computing and Networking, pp. 39–50 (2013)
Feng, T., Liu, Z., Kwon, K.-A., Shi, W., Carbunar, B., Jiang, Y., Nguyen, N.: Continuous mobile authentication using touchscreen gestures. In: Proceedings of IEEE International Conference on Biometrics: Theory, Applications and Systems, pp. 451–456 (2013)
Xu, Z., Bai, K., Zhu, S.: TapLogger: inferring user inputs on smartphonetouchscreens using on-board motion sensors. In: Proceedings of International conference on Security and Privacy in Wireless and Mobile Networks, pp. 113–124. ACM (2012)
Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security 8(1), 136–148 (2013)
Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it’s you! Implicit authentication based on touch screen patterns. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987–996. ACM (2012)
Touch Screen. http://inventors.about.com/library/inventors/bltouch.htm
Bi, X., Li, Y., Zhai, S.: FFitts law: modeling finger touch with fitts’ law. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 1363–1372. ACM (2013)
Welford, A.T., Norris, A.H., Shock, N.W.: Speed and Accuracy of Movement And Their Changes with Age. Elsevier Journal Acta Psychologica. 30, 3–15 (1969)
Killourhy, K.S., Maxion, R.A.: The effect of clock resolution on keystroke dynamics. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 331–350. Springer, Heidelberg (2008)
Rogers, R.: Android Application Development. O’Reilly (2009)
Zheng, N., Baiy, K., Huangy, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: Proceedings of IEEE International Conference on Network Protocols (ICNP), pp. 221–232 (2014)
Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: SilentSense: silent user identification via touch and movement behavioral biometrics. In: Proceedings of Annual International Conference on Mobile Computing & Networking (MobiCom), pp. 187–190 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bhattasali, T., Chaki, N., Saeed, K., Chaki, R. (2015). U-Stroke Pattern Modeling for End User Identity Verification Through Ubiquitous Input Device. In: Saeed, K., Homenda, W. (eds) Computer Information Systems and Industrial Management. CISIM 2015. Lecture Notes in Computer Science(), vol 9339. Springer, Cham. https://doi.org/10.1007/978-3-319-24369-6_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-24369-6_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24368-9
Online ISBN: 978-3-319-24369-6
eBook Packages: Computer ScienceComputer Science (R0)