Abstract
The ownership of user actions in computer and mobile applications is an important concern, especially when using shared devices. User identification using physical biometric authentication methods permits the actual user to access the device. However, in cases where different users may access a shared device during the same active session, the person who owns the active session will be accountable for any actions performed by the other users. Thus, user identification using behavioral characteristics has come into the picture. Human activity recognition from mobile sensor data is gaining more interest with the advent of mobile devices and the emergence of the Internet of Things, where different applications such as elderly health monitoring, athletic evaluation, and context-aware behavior are being developed. In this paper, we show how human activity data can be utilized to identify the actual device user. We build deep learning models that are capable of identifying the users of mobile and wearable devices based on their body movements and daily activities. We use the Long Short-Term Memory classifier for building the user identification model based on time-series data from mobile motion sensors. The model targets the users that were involved in the training process. We tested our approach on two publicly available human activity datasets that contain daily activities and fall states data from accelerometer and gyroscope mobile sensors. The results show that the models are capable of identifying the actual mobile device users from their motion data with an accuracy of up to 90%. Further, the results show that the model from the accelerometer data outperforms the one from gyroscope data.
Similar content being viewed by others
References
Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)
Malatras, A., Geneiatakis, D., Vakalis, I.: On the efficiency of user identification: a system-based approach. Int. J. Inf. Secur. 16(6), 653–671 (2017)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Khan, S.H., Akbar, M.A., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor authentication. Pattern Recogn. 48(2), 458–472 (2015)
Parkin, S., Patel, T., Lopez-Neira, I., Tanczer, L.: Usability analysis of shared device ecosystem security: informing support for survivors of iot-facilitated tech-abuse. In: Proceedings of the New Security Paradigms Workshop, pp. 1–15 (2019)
Nurse, J.R., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G.R., Whitty, M.: Understanding insider threat: A framework for characterising attacks. In: IEEE Security and Privacy Workshops. IEEE 2014, pp. 214–228 (2014)
Gadaleta, M., Rossi, M.: Idnet: Smartphone-based gait recognition with convolutional neural networks. Pattern Recogn. 74, 25–37 (2018)
Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Cell phone-based biometric identification. In: 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)
Vrigkas, M., Nikou, C., Kakadiaris, I.A.: A review of human activity recognition methods. Front. Robot. AI 2, 28 (2015)
Chen, Y., Zhu, X., Zheng, W., Lai, J.: Person re-identification by camera correlation aware feature augmentation. IEEE Trans. Pattern Anal. Mach. Intell. 40(2), 392–408 (2018)
Khalil, N., Gnawali, O., Benhaddou, D., Subhlok, J.: Sonicdoor: A person identification system based on modeling of shape, behavior, and walking patterns. ACM Trans. Sens. Networks 14(3–4), 27-1–27-21 (2018)
Zhao, Y., Dong, L., Wang, J., Hu, B., Fu, Y.: Implementing indoor positioning system via zigbee devices. In: 2008 42nd Asilomar Conference on Signals, Systems and Computers, Pacic Grove, CA, 2008, pp. 1867–1871 (2008)
Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: 2008 International Conference on Computer and Electrical Engineering. IEEE, pp. 82–86 (2008)
Eberz, S., Rasmussen, K.B., Lenders, V., Martinovic, I.: Looks like eve: exposing insider threats using eye movement biometrics. ACM Trans. Privacy Secur. 19(1), 1–31 (2016)
Tang, C., Phoha, V.V.: An empirical evaluation of activities and classifiers for user identification on smartphones. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (Btas). IEEE, pp. 1–8 (2016)
Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)
Hnoohom, N., Jitpattanakul, A., You, I., Mekruksavanich, S.: Deep learning approach for complex activity recognition using heterogeneous sensors from wearable device. In: 2021 Research, Invention, and Innovation Congress: Innovation Electricals and Electronics (RI2C), Bangkok, Thailand, September pp. 60–65 (2021)
Chathuramali, K.M., Rodrigo, R.: Faster human activity recognition with svm. In: International Conference on Advances in ICT for Emerging Regions (ICTer2012). IEEE, pp. 197–203 (2012)
Sprager, S., Zazula, D.: A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine. WSEAS Trans. Signal Process. 5(11), 369–378 (2009)
Mekruksavanich, S., Jitpattanakul, A.: Biometric user identification based on human activity recognition using wearable sensors: An experiment using deep learning models. Electronics 10(3), 308 (2021)
Zhang, M.: Gait activity authentication using lstm neural networks with smartphone sensors. In: 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), Shenzhen, China, pp. 456–461 (2019)
Anguita, D., Ghio, A., Oneto, L., Parra Perez, X., Reyes Ortiz, J.L.: A public domain dataset for human activity recognition using smartphones. In: Proceedings of the 21th International European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, pp. 437–442 (2013)
Micucci, D., Mobilio, M., Napoletano, P.: Unimib shar: A dataset for human activity recognition using acceleration data from smartphones. Appl. Sci. 7(10), 1101 (2017)
BenAbdelkader, C., Cutler, R., Davis, L.S.: Person identification using automatic height and stride estimation. In: 16th International Conference on Pattern Recognition, ICPR 2002. Quebec, Canada: IEEE Computer Society, pp. 377–380 (2002)
Johnson, A.Y., Bobick, A.F.: A multi-view method for gait recognition using static body parameters. In: Bigün, J., Smeraldi, F. (eds.) Third International Conference on Audio-and Video-Based Biometric Person Authentication, AVBPA 2001, Halmstad, Sweden, pp. 301–311 (2001)
Srinivasan, V., Stankovic, J.A., Whitehouse, K.: Using height sensors for biometric identification in multi-resident homes. In: Floréen, P., Krüger, A., Spasojevic, M. (Eds.) 8th International Conference on Pervasive Computing, Helsinki, Finland, 17-20 May, pp. 337–354 (2010)
Wong, K.B., Zhang, T., Aghajan, H.K.: Extracting patterns of behavior from a network of binary sensors. J. Ambient. Intell. Humaniz. Comput. 6(1), 83–105 (2015)
Mokhtari, G., Bashi, N., Zhang, Q., Nourbakhsh, G.: Non-wearable human identification sensors for smart home environment: a review. Sens. Rev. 38(3), 391–404 (2018)
Kim, H., Kim, I., Kim, J.: Designing the smart foot mat and its applications: as a user identification sensor for smart home scenarios. Adv. Sci. Technol. Lett. 87, 1–5 (2015)
Heo, K.H., Jeong, S., Kang, S.J.: Real-time user identification and behavior prediction based on foot-pad recognition. Sensors 19(13), 2899 (2019)
Crandall, A.S., Cook, D.J.: Behaviometrics for identifying smart home residents. In: Human Aspects in Ambient Intelligence. Atlantis Press, Paris, Vol. 8, pp. 55–71 (2013)
Lesani, F.S., Ghazvini, F.F., Amirkhani, H.: Smart home user identification using bag of events approach. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE). Mashhad, Iran: IEEE, pp. 379–383 (2017)
Zhang, J., Wei, B., Hu, W., Kanhere, S.S.: Wifi-id: Human identification using wifi signal. In: 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC, USA, pp. 75–82 (2016)
Zeng, Y., Pathak, P.H., Mohapatra, P.: Wiwho: Wifi-based person identification in smart spaces. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, Austria, pp. 1–12 (2016)
Ropponen, A., Rimminen, H., Sepponen, R.: Robust system for indoor localisation and identification for the health care environment. Wireless Pers. Commun. 59(1), 57–71 (2011)
Truong, P.H., You, S., Ji, S.-H., Jeong, G.-M.: Wearable system for daily activity recognition using inertial and pressure sensors of a smart band and smart shoes. Int. J. Comput. Commun. Control 14(6), 726–742 (2020)
Bergmann, J., McGregor, A.: Body-worn sensor design: what do patients and clinicians want? Ann. Biomed. Eng. 39(9), 2299–2312 (2011)
López, G., Marín, G., Calderón, M.: Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues. J. Ambient. Intell. Humaniz. Comput. 8(4), 497–511 (2017)
Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: User verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols. IEEE, Raleigh, NC, pp. 221–232 (2014)
Muaaz, M., Mayrhofer, R.: Accelerometer based gait recognition using adapted gaussian mixture models. In: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, Singapore, Singapore, pp. 288–291 (2016)
Ramos, F.B.A., Lorayne, A., Costa, A.A.M., de Sousa, R.R., Almeida, H.O., Perkusich, A.: Combining smartphone and smartwatch sensor data in activity recognition approaches: an experimental evaluation. In: Gou, J. (Ed.) The 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, Redwood City, San Francisco Bay, USA, July 1-3 pp. 267–272 (2016)
Cola, G., Avvenuti, M., Musso, F., Vecchio, A.: Gait-based authentication using a wrist-worn device. In: Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Hiroshima, Japan, November 28–December 1, pp. 208–217 (2016)
Findling, R.D., Muaaz, M., Hintze, D., Mayrhofer, R.: Shakeunlock: Securely transfer authentication states between mobile devices. IEEE Trans. Mob. Comput. 16(4), 1163–1175 (2016)
Lewis, A., Li, Y., Xie, M.: Real time motion-based authentication for smartwatch. In: 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, October 17-19, pp. 380–381 (2016)
Liang, G.-C., Xu, X.-Y., Yu, J.-D.: User-authentication on wearable devices based on punch gesture biometrics. In: ITM Web of Conferences, vol. 11. EDP Sciences, (2017)
Griswold-Steiner, I., Matovu, R., Serwadda, A.: Handwriting watcher: A mechanism for smartwatch-driven handwriting authentication. In: 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, Denver, 1-4 October, pp. 216–224 (2017)
Kumar, R., Phoha, V.V., Serwadda, A.: Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. In; 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, Niagara Falls, NY, vol 6–9, pp. 1–8 (2016)
Zeng, Y., Pande, A., Zhu, J., Mohapatra, P.: Wearia: Wearable device implicit authentication based on activity information. In: 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). Macau, China, Vol 12–15, pp. 1–9 (2017)
Yang, J., Li, Y., Xie, M.: Motionauth: Motion-based authentication for wrist worn smart devices. In: 2015 IEEE International conference on pervasive computing and communication workshops (PerCom Workshops). IEEE, St. Louis, MO, 23-27 March, pp. 550–555 (2015)
Al-Naffakh, N., Clarke, N., Li, F.: Continuous user authentication using smartwatch motion sensor data. In: IFIP International Conference on Trust Management. Springer, Toronto, July 10-13, pp. 15–28 (2018)
Xu, W., Shen, Y., Zhang, Y., Bergmann, N., Hu, W.: Gait-watch: A context-aware authentication system for smart watch based on gait recognition. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, Pittsburgh, PA, USA, April 18–21, pp. 59–70 (2017)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newsl 11(1), 10–18 (2009)
Amini, S., Noroozi, V., Pande, A., Gupte, S., Yu, P.S., Kanich, C.: Deepauth: A framework for continuous user re-authentication in mobile apps. In: Proceedings of the 27th ACM International Conference on Information and Knowledge Management, ser. CIKM ’18, Torino, Italy, October, pp. 2027–2035 (2018)
Lee, S.-M., Yoon, S.M., Cho, H.: Human activity recognition from accelerometer data using convolutional neural network. In; 2017 IEEE International Conference on Big Data and Smart Computing (BigComp), Jeju, South Korea, February pp. 131–134 (2017)
Deep learning for sensor-based activity recognition: A survey. Pattern Recognition Letters, vol. 119, pp. 3–11, deep Learning for Pattern Recognition (2019)
Weiss, G.M., Yoneda, K., Hayajneh, T.: Smartphone and smartwatch-based biometrics using activities of daily living. IEEE Access 7, 133190–133202 (2019)
Giorgi, G., Saracino, A., Martinelli, F.: Using recurrent neural networks for continuous authentication through gait analysis. Pattern Recogn. Lett. 147, 157–163 (2021)
Sitová, Z., Šeděnka, J., Yang, Q., Peng, G., Zhou, G., Gasti, P., Balagani, K.S.: Hmog: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 11(5), 877–892 (2016)
Abuhamad, M., Abuhmed, T., Mohaisen, D., Nyang, D.: AUToSen: deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Int. Things J. 7(6), 5008–5020 (2020)
Chicco, D.: Ten quick tips for machine learning in computational biology. BioData Mining 10(1), 1–17 (2017)
Mekruksavanich, S., Jantawong, P., Jitpattanakul, A.: Enhancement of sensor-based user identification using data augmentation techniques. In: 2022 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT NCON), Chiang Rai, Thailand, January pp. 333–337 (2022)
Casale, P., Pujol, O., Radeva, P.: Personalization and user verification in wearable systems using biometric walking patterns. Pers. Ubiquit. Comput. 16(5), 563–580 (2012)
Ye, N., Sun, C., Xu, R., Sun, F.: A method of equipment safety certification based on daily cycle activity. In: 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD). IEEE, pp. 651–658 (2021)
Taylor, S.J., Letham, B.: Forecasting at scale. Am. Stat. 72(1), 37–45 (2018)
Yao, S., Hu, S., Zhao, Y., Zhang, A., Abdelzaher, T.: Deepsense: A unified deep learning framework for time-series mobile sensing data processing. In: Proceedings of the 26th International Conference on World Wide Web, ser. WWW ’17, Perth, Australia, April, pp. 351–360 (2017)
Deb, D., Ross, A., Jain, A.K., Prakah-Asante, K., Prasad, K.V.: Actions speak louder than (pass)words: Passive authentication of smartphone* users via deep temporal features. In: 2019 International Conference on Biometrics (ICB), Crete, Greece, June, pp. 1–8 (2019)
Chen, L., Zhang, Y., Peng, L.: Metier: a deep multi-task learning based activity and user recognition model using wearable sensors. Proc. ACM Interact. Mob. Wearable Ubiquit. Technol. 4(1), 1–18 (2020)
Medsker, L.R., Jain, L.: Recurrent neural networks. Design and Applications, vol. 5, (2001)
Sherstinsky, A.: Fundamentals of recurrent neural network (rnn) and long short-term memory (lstm) network. Physica D 404, 132306 (2020)
Chen, Y., Zhong, K., Zhang, J., Sun, Q., Zhao, X.: Lstm networks for mobile human activity recognition. In: International conference on artificial intelligence: technologies and applications. Atlantis Press, pp. 50–53 (2016)
Zebin, T., Sperrin, M., Peek, N., Casson, A.J.: Human activity recognition from inertial sensor time-series using batch normalized deep lstm recurrent networks. In: 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, pp. 1–4 (2018)
San-Segundo, R., Lorenzo-Trueba, J., Martínez-González, B., Pardo, J.M.: Segmenting human activities based on hmms using smartphone inertial sensors. Pervasive Mob. Comput. 30, 84–96 (2016)
Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, (2014)
Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(1), 1929–1958 (2014)
Ramachandran, P., Zoph, B., Le, Q.V.: Searching for activation functions. arXiv preprint arXiv:1710.05941, (2017)
LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278–2324 (1998)
Huang, W., Zhang, L., Teng, Q., Song, C., He, J.: The convolutional neural networks training with channel-selectivity for human activity recognition based on sensors. IEEE J. Biomed. Health Inform. 25(10), 3834–3843 (2021)
Alawneh, L., Alsarhan, T., Al-Zinati, M., Al-Ayyoub, M., Jararweh, Y., Lu, H.: Enhancing human activity recognition using deep learning and time series augmented data. J. Ambient Intell. Human. Comput. 12, 1–16 (2021)
Alawneh, L., Al-Ayyoub, M., Al-Sharif, Z.A., Shatnawi, A.: Personalized human activity recognition using deep learning and edge-cloud architecture. J. Ambient Intell. Human. Comput. pp. 1–13, (2022)
Han, C., Zhang, L., Tang, Y., Huang, W., Min, F., He, J.: Human activity recognition using wearable sensors by heterogeneous convolutional neural networks. Exp. Syst. Appl. pp. 116764 (2022)
Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard M.: Tensorflow: a system for large-scale machine learning. In: 12th \(\{USENIX\}\) symposium on operating systems design and implementation (\(\{OSDI\}\) 16), pp. 265–283 (2016)
Ketkar, N.: Introduction to keras. In: Deep learning with Python. Springer, pp. 97–111 (2017)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
No conflicts of interest.
Research involving human participants and/or animals
This research study uses publicly available data that were gathered from human participants. Thus, the responsibility lies with the authors of the two datasets. Further, we did not add new data in this study.
Informed consent
Not applicable in this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alawneh, L., Al-Zinati, M. & Al-Ayyoub, M. User identification using deep learning and human activity mobile sensor data. Int. J. Inf. Secur. 22, 289–301 (2023). https://doi.org/10.1007/s10207-022-00640-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-022-00640-4