Show simple item record

dc.contributor.authorYerima, Suleimanen
dc.contributor.authorSezer, Sakiren
dc.contributor.authorYao, F.en
dc.contributor.authorKang, B.en
dc.date.accessioned2018-10-31T10:52:21Z
dc.date.available2018-10-31T10:52:21Z
dc.date.issued2015-09
dc.identifier.citationYao, F., Yerima, S. Y., Sezer, S., Kang, B. (2015) Event Driven Implicit Authentication For Mobile Access Control, In Proceedings of the 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), Cambridge, UK, September 2015.en
dc.identifier.isbn9781479986606
dc.identifier.urihttp://hdl.handle.net/2086/16934
dc.descriptionThe file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.en
dc.description.abstractIn order to protect user privacy on mobile devices, an event-driven implicit authentication scheme is proposed in this paper. Several methods of utilizing the scheme for recognizing legitimate user behavior are investigated. The investigated methods compute an aggregate score and a threshold in real-time to determine the trust level of the current user using real data derived from user interaction with the device. The proposed scheme is designed to: operate completely in the background, require minimal training period, enable high user recognition rate for implicit authentication, and prompt detection of abnormal activity that can be used to trigger explicitly authenticated access control. In this paper, we investigate threshold computation through standard deviation and EWMA (exponentially weighted moving average) based algorithms. The result of extensive experiments on user data collected over a period of several weeks from an Android phone indicates that our proposed approach is feasible and effective for lightweight real-time implicit authentication on mobile smartphones.en
dc.language.isoenen
dc.publisherIEEEen
dc.subjectAuthenticationen
dc.subjectTrust levelen
dc.subjectimplicit authentication schemeen
dc.subjectbehaviour based authenticationen
dc.subjectEWMAen
dc.subjectmobile securityen
dc.titleEvent-driven implicit authentication for mobile access controlen
dc.typeConferenceen
dc.identifier.doihttps://doi.org/10.1109/ngmast.2015.47
dc.researchgroupCyber Technology Institute (CTI)en
dc.funderN/Aen
dc.projectidN/Aen
dc.cclicenceCC-BY-NCen
dc.date.acceptance2015en
dc.researchinstituteCyber Technology Institute (CTI)en
dc.exception.ref2021codes254aen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record