Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
<p>Smartphone inertial sensors are sensitive to the orientation of the smartphone. The accelerometer measures acceleration, the gyroscope measures rotation, and the magnetometer measures the magnetic field strength along the <span class="html-italic">x</span>, <span class="html-italic">y</span>, and <span class="html-italic">z</span> axes.</p> "> Figure 2
<p>Proposed methodology for smartphone user authentication.</p> "> Figure 3
<p>Average distance between the learned centroids and the new centroids for different training sets.</p> "> Figure 4
<p>Effect of varying <math display="inline"> <semantics> <mrow> <msub> <mi mathvariant="normal">R</mi> <mrow> <mi>m</mi> <mi>i</mi> <mi>n</mi> </mrow> </msub> </mrow> </semantics> </math> value on the threshold values <math display="inline"> <semantics> <mrow> <msub> <mo>Ʈ</mo> <mn>1</mn> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <msub> <mo>Ʈ</mo> <mn>2</mn> </msub> </mrow> </semantics> </math>.</p> "> Figure 5
<p>Individual classification accuracies of selected activities when classified with DT, K-NN, BN, and SVM classifiers for five different body positions: (<b>a</b>) waist; (<b>b</b>) left thigh; (<b>c</b>) right thigh; (<b>d</b>) upper arm; (<b>e</b>) wrist.</p> "> Figure 5 Cont.
<p>Individual classification accuracies of selected activities when classified with DT, K-NN, BN, and SVM classifiers for five different body positions: (<b>a</b>) waist; (<b>b</b>) left thigh; (<b>c</b>) right thigh; (<b>d</b>) upper arm; (<b>e</b>) wrist.</p> "> Figure 6
<p>Computational time taken by different classifiers for activity classification.</p> "> Figure 7
<p>Euclidean distance between the authenticated user class feature vector and the feature vectors computed from testing data for different candidate users.</p> "> Figure 8
<p>Output of the classification model at different time intervals while classifying a candidate user belonging to the authenticated class.</p> "> Figure 9
<p>Individual classification accuracies of different user classes at five different body positions.</p> ">
Abstract
:1. Introduction
- Orientation sensitivity of smartphone inertial sensors, i.e., the readings of these sensors change by changing the orientation of the smartphone, as shown in Figure 1.
- Effectively learning activity and motion patterns from noisy sensors data.
- Incorporating real-time sensors data into a biometric authentication setup on a smartphone, which is limited in terms of memory and processing power.
- Lack of “negative” samples for efficient testing of an authentication model.
- A novel and multi-class smartphone user authentication scheme, based on activity recognition, is presented for different types of users that may access a smartphone.
- Micro-environment sensing is combined with physical activity recognition to eliminate false positives arising due to the position sensitivity of smartphone inertial sensors, resulting in better user authentication.
- A novel probabilistic scoring model, based on activity recognition, is presented for smartphone user classification.
2. Related Work
3. IntelliAuth Framework
3.1. Recognition of ADLs for Smartphone User Authentication
3.2. Micro-Environment Sensing for Activity Recognition
4. Methodology of Research
4.1. Data Acquisition
4.2. Data Pre-Processing
4.2.1. Noise Removal
4.2.2. Data Segmentation
4.3. Feature Extraction
4.4. Activity Recognition
4.5. User Authentication
4.5.1. Probabilistic Scoring Model for User Classification
Activity Weighting
Computation of Trained Feature Vectors for Different User Classes
Calculation of Euclidean Distance between Feature Vectors
- represents Euclidean distance computed between the feature vector of the activity recognized and its trained feature vector for the authenticated user class.
- denotes Euclidean distance computed between the feature vector of the activity recognized and its trained feature vector for the supplementary user class.
- indicates Euclidean distance computed between the feature vector of the activity recognized and its trained feature vector for the impostor user class.
Calculation of Conditional Probabilities for Detecting Different Class Users
Normalization of Conditional Probabilities
Computation of Access Level Values for Multiple User Classes
- For , the integer was assigned a value of 0, i.e., .Hence, from Equation (13), .
- For , the integer was assigned a value of 1, i.e., .Hence, from Equation (13), .
- For , the integer was assigned a value of 2, i.e., .Hence, from Equation (13), .
Calculation of Classification Score
- For , .Hence, from Equation (14),
- For , .Hence, from Equation (14),
- For , Hence, from Equation (14),
- If , then will have a range near to [0.67 1], with having a range [0.67 1].
- If , then will have a range near to [0.45 0.67], with having a range [0.67 1].
- If , then will nearly have a range of values less than 0.45 with having a range of [0.67 1].
Calculation of Threshold Values for Classifying a Smartphone User
- For , the user was classified as impostor.
- For , the user was classified as supplementary.
- For , the user was classified as authenticated.
Effect of Varying on Threshold Values and User Classification
5. Results and Performance Analysis
5.1. Performance Analysis of Activity Recognition
5.2. Performance Analysis of User Classification
6. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- The Statistics Portal. Available online: http://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide (accessed on 8 August 2017).
- Gartner Says Worldwide PC, Tablet and Mobile Phone Combined Shipments to Reach 2.4 Billion Units in 2013, a Press Release Published April 4, 2013. Available online: http://www.gartner.com/newsroom/id/2408515 (accessed on 8 August 2017).
- Mayron, L.M. Biometric Authentication on Mobile Devices. IEEE Secur. Priv. 2015, 13, 70–73. [Google Scholar] [CrossRef]
- Data Genetics: Pin Analysis. Available online: http://www.datagenetics.com/blog/september32013 (accessed on 8 August 2017).
- SRLabs: Spoofing Fingerprints. Available online: https://srlabs.de/spoofing-fingerprints (accessed on 8 August 2017).
- Shukla, D.; Kumar, R.; Serwadda, A.; Phoha, V.V. Beware, your hands reveal your secrets! In Proceedings of the CCS-ACM Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014; pp. 904–917. [Google Scholar]
- Aviv, A.J.; Gibson, K.; Mossop, E.; Blaze, M.; Smith, J.M. Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies, Washington, DC, USA, 11–13 August 2010; pp. 1–7. [Google Scholar]
- Draffin, B.; Zhu, J.; Zhang, J. KeySens : Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction. Mob. Comput. Appl. Serv. 2014, 130, 184–201. [Google Scholar]
- Alzubaidi, A.; Kalita, J. Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 2016, 18, 1998–2026. [Google Scholar] [CrossRef]
- Gafurov, D. A survey of biometric gait recognition: Approaches, security and challenges. In Proceedings of the Norwegian Informatics Conference, Oslo, Norway, 19–21 November 2007; pp. 19–21. [Google Scholar]
- Yang, L.; Guo, Y.; Ding, X.; Han, J.; Liu, Y.; Wang, C.; Hu, C. Unlocking Smart Phone through Handwaving Biometrics. IEEE Trans. Mob. Comput. 2015, 14, 1044–1055. [Google Scholar] [CrossRef]
- Lu, H.; Bernheim Brush, A.J.; Priyantha, B.; Karlson, A.K.; Liu, J. Speakersense: Energy efficient unobtrusive speaker identification on mobile phones. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2011; Volume 6696, pp. 188–205. [Google Scholar]
- Blanco-Gonzalo, R.; Miguel-Hurtado, O.; Mendaza-Ormaza, A.; Sanchez-Reillo, R. Handwritten signature recognition in mobile scenarios: Performance evaluation. In Proceedings of the International Carnahan Conference on Security Technology, Boston, MA, USA, 15–18 October 2012; pp. 174–179. [Google Scholar]
- Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8, 136–148. [Google Scholar] [CrossRef]
- Zheng, N.; Bai, K.; Huang, H.; Wang, H. You are how you touch: User verification on smartphones via tapping behaviors. In Proceedings of the International Conference on Network Protocols, ICNP, Raleigh, NC, USA, 21–24 October 2014; pp. 221–232. [Google Scholar]
- Bo, C.; Zhang, L.; Li, X.-Y.; Huang, Q.; Wang, Y. Silentsense: Silent user identification via dynamics of touch and movement behavioral biometrics. MobiCom 2013, 13, 187. [Google Scholar]
- Sitova, Z.; Sedenka, J.; Yang, Q.; Peng, G.; Zhou, G.; Gasti, P.; Balagani, K.S. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 2016, 11, 877–892. [Google Scholar] [CrossRef]
- Neverova, N.; Wolf, C.; Lacey, G.; Fridman, L.; Chandra, D.; Barbello, B.; Taylor, G. Learning Human Identity from Motion Patterns. IEEE Access 2016, 4, 1810–1820. [Google Scholar] [CrossRef]
- Yang, Z.; Shangguan, L.; Gu, W.; Zhou, Z.; Wu, C.; Liu, Y. Sherlock: Micro-environment sensing for smartphones. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 3295–3305. [Google Scholar] [CrossRef]
- Shoaib, M.; Scholten, H.; Havinga, P.J.M. Towards physical activity recognition using smartphone sensors. In Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted, Vietri sul Mere, Italy, 18–21 December 2013; pp. 80–87. [Google Scholar]
- Shoaib, M.; Bosch, S.; Durmaz Incel, O.; Scholten, H.; Havinga, P.J.M. Fusion of smartphone motion sensors for physical activity recognition. Sensors 2014, 14, 10146–10176. [Google Scholar] [CrossRef] [PubMed]
- Consolvo, S.; McDonald, D.W.; Toscos, T.; Chen, M.Y.; Froehlich, J.; Harrison, B.; Klasnja, P.; LaMarca, A.; LeGrand, L.; Libby, R.; et al. Activity sensing in the wild: A field trial of UbiFit Garden. In Proceedings of the 2008 Conference on Human Factors in Computing Systems, Florence, Italy, 5–10 April 2008; pp. 1797–1806. [Google Scholar]
- Miluzzo, E.; Lane, N.D.; Fodor, K.; Peterson, R.; Lu, H.; Musolesi, M.; Eisenman, S.B.; Zheng, X.; Campbell, A.T. Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. In Proceedings of the 6th ACM Conference on Embedded Networked Sensor Systems, Raleigh, NC, USA, 5–7 November 2008; pp. 337–350. [Google Scholar]
- Khan, W.Z.; Xiang, Y.; Aalsalem, M.Y.; Arshad, Q. Mobile phone sensing systems: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 402–427. [Google Scholar] [CrossRef]
- Su, X.; Tong, H.; Ji, P. Activity recognition with smartphone sensors. Tsinghua Sci. Technol. 2014, 19, 235–249. [Google Scholar]
- Lee, S.-W.; Mase, K. Activity and location recognition using wearable sensors. IEEE Pervasive Comput. 2002, 1, 24–32. [Google Scholar]
- Bao, L.; Intille, S.S. Activity recognition from user-annotated acceleration data. Pervasive Comput. 2004, 1–17. [Google Scholar]
- Mathie, M.J.; Coster, A.C.F.; Lovell, N.H.; Celler, B.G.; Lord, S.R.; Tiedemann, A. A pilot study of long-term monitoring of human movements in the home using accelerometry. J. Telemed. Telecare 2004, 10, 144–151. [Google Scholar] [CrossRef] [PubMed]
- Bulling, A.; Blanke, U.; Schiele, B. A tutorial on human activity recognition using body-worn inertial sensors. ACM Comput. Surv. 2014, 1, 1–33. [Google Scholar] [CrossRef]
- Plötz, T.; Hammerla, N.Y.; Olivier, P. Feature learning for activity recognition in ubiquitous computing. Proceeding of the Twenty-Second International Joint Conference on Artificial Intelligence, Barcelona, Spain, 16–22 July 2011; Volume 2, pp. 1729–1734. [Google Scholar]
- Shoaib, M.; Bosch, S.; Incel, O.D.; Scholten, H.; Havinga, P.J.M. Complex human activity recognition using smartphone and wrist-worn motion sensors. Sensors 2016, 16, 426. [Google Scholar] [CrossRef] [PubMed]
- Miluzzo, E.; Cornelius, C.T.; Ramaswamy, A.; Choudhury, T.; Liu, Z.; Campbell, A.T. Darwin Phones : The Evolution of Sensing and Inference on Mobile Phones. Darwin 2010, 14, 5–20. [Google Scholar]
- Kwapisz, J.; Weiss, G.; Moore, S. Activity recognition using cell phone accelerometers. ACM SIGKDD Explor. 2011, 12, 74–82. [Google Scholar] [CrossRef]
- Mun, M.; Boda, P.; Reddy, S.; Shilton, K.; Yau, N.; Burke, J.; Estrin, D.; Hansen, M.; Howard, E.; West, R. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, Kraków, Poland, 22–25 June 2009; pp. 55–68. [Google Scholar]
- Shoaib, M.; Bosch, S.; Scholten, H.; Havinga, P.J.M.; Incel, O.D. Towards detection of bad habits by fusing smartphone and smartwatch sensors. In Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops, St. Louis, MO, USA, 23–27 March 2015; pp. 591–596. [Google Scholar]
- Moya, M.M.; Koch, M.W.; Hostetler, L. One-Class Classifier Networks for Target Recognition Applications; Technical Report SAND-93-0084C; DOE: Washington, DC, USA, 1993. [Google Scholar]
- Trojahn, M.; Ortmeier, F. Toward mobile authentication with keystroke dynamics on mobile phones and tablets. In Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013; pp. 697–702. [Google Scholar]
- Kohavi, R. Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Oregon, Portland, 2–4 August 1996; Volume 7, pp. 202–207. [Google Scholar]
- Friedman, N.; Geiger, D.; Goldszmidt, M. Bayesian Network Classifiers. Mach. Learn. 1997, 29, 131–163. [Google Scholar] [CrossRef]
- Pal, S.K.; Mitra, S. Multilayer perceptron, fuzzy sets, and classification. IEEE Trans. Neural Netw. 1992, 3, 683–697. [Google Scholar] [CrossRef] [PubMed]
- Shrestha, B.; Saxena, N.; Harrison, J. Wave-to-access: Protecting sensitive mobile device services via a hand waving gesture. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2013; Volume 8257, pp. 199–217. [Google Scholar]
- Cortes, C.; Vapnik, V. Support-Vector Networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
- Hwang, Y.-S.; Bang, S.-Y. An Efficient Method to Construct a Radial Basis Function Neural Network Classifier. Neural Netw. 1997, 10, 1495–1503. [Google Scholar] [CrossRef]
- Feng, T.; Zhao, X.; Carbunar, B.; Shi, W. Continuous mobile authentication using virtual key typing biometrics. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16–18 July 2013; pp. 1547–1552. [Google Scholar]
- Pal, M. Random forest classifier for remote sensing classification. Int. J. Remote Sens. 2005, 26, 217–222. [Google Scholar] [CrossRef]
- Guo, G.; Wang, H.; Bell, D.; Bi, Y.; Greer, K. kNN Model-Based Approach in Classification. In Proceedings of the OTM Confederated International Conferences, CoopIS, DOA, and ODBASE 2003, Catania, Sicily, Italy, 3–7 November 2003; pp. 986–996. [Google Scholar]
- Shahzad, M.; Liu, A.X.; Samuel, A. Secure unlocking of mobile touch screen devices by simple gestures—You can see it but you can not do it. In Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, Miami, FL, USA, 30 September–4 October 2013; p. 39. [Google Scholar]
- Derawi, M.O.; Nickely, C.; Bours, P.; Busch, C. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Proceedings of the 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 15–17 October 2010; pp. 306–311. [Google Scholar]
- Keogh, E.; Ratanamahatana, C.A. Exact indexing of dynamic time warping. Knowl. Inf. Syst. 2005, 7, 358–386. [Google Scholar] [CrossRef]
- Mäntyjärvi, J.; Lindholm, M.; Vildjiounaite, E.; Mäkelä, S.M.; Ailisto, H. Identifying users of portable devices from gait pattern with accelerometers. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (2005 ICASSP), Philadelphia, PA, USA, 23 March 2005; Volume 2. [Google Scholar]
- Clarke, N.L.; Mekala, A.R. The application of signature recognition to transparent handwriting verification for mobile devices. Inf. Manag. Comput. Secur. 2007, 15, 214–225. [Google Scholar] [CrossRef]
- Sae-Bae, N.; Memon, N. Online signature verification on mobile devices. Inf. Forensics Secur. IEEE Trans. 2014, 9, 933–947. [Google Scholar] [CrossRef]
- Kunz, M.; Kasper, K.; Reininger, H.; Möbius, M.; Ohms, J. Continuous speaker verification in realtime. In Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Darmstadt, Germany, 8–9 September 2011; pp. 79–88. [Google Scholar]
- Rabiner, L.R. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 1989, 77, 257–286. [Google Scholar] [CrossRef]
- Das, A.; Manyam, O.K.; Tapaswi, M.; Taranalli, V. Multilingual spoken-password based user authentication in emerging economies using cellular phone networks. In Proceedings of the 2008 IEEE Workshop on Spoken Language Technology, Goa, India, 15–19 December 2008; pp. 5–8. [Google Scholar]
- Kambourakis, G.; Damopoulos, D.; Papamartzivanos, D.; Pavlidakis, E. Introducing touchstroke: Keystroke-based authentication system for smartphones. Secur. Commun. Netw. 2016, 9, 542–554. [Google Scholar] [CrossRef]
- Zhu, J.; Wu, P.; Wang, X.; Zhang, J. SenSec: Mobile security through passive sensing. In Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC 2013), San Diego, CA, USA, 28–31 January 2013; pp. 1128–1133. [Google Scholar]
- Sun, L.; Zhang, D.; Li, B.; Guo, B.; Li, S. Activity recognition on an accelerometer embedded mobile phone with varying positions and orientations. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2010; Volume 6406, pp. 548–562. [Google Scholar]
- Anjum, A.; Ilyas, M.U. Activity recognition using smartphone sensors. In Proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference, Las Vegas, NV, USA, 11–14 January 2013; pp. 914–919. [Google Scholar]
- Anguita, D.; Ghio, A.; Oneto, L.; Parra, X.; Reyes-Ortiz, J.L. A public domain dataset for human activity recognition using smartphones. In Proceedings of the 21th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgium, 24–26 April 2013. [Google Scholar]
- Alpaydın, E. Introduction to Machine Learning; MIT Press: Cambridge, MA, USA, 2012; Volume 33, pp. 81–87. [Google Scholar]
- Platt, J.C. Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines. Microsoft: Washington, DC, USA. Available online: http://www.microsoft.com/en-us/research/publication/sequential-minimal-optimization-a-fast-algorithm-for-training-support-vector-machines/# (accessed on 8 August 2017).
- Hartigan, J.A.; Wong, M.A. A K-means clustering algorithm. Appl. Stat. 1979, 28, 100–108. [Google Scholar] [CrossRef]
- Kaufman, L.; Rousseeuw, P.J. Finding Groups in Data: An Introduction to Cluster Analysis; Wiley-Interscience: Hoboken, NJ, USA, 1990. [Google Scholar]
- Singla Karambir, A. Comparative analysis & amp; evaluation of euclidean distance function and manhattan distance function using K-means algorithm. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2012, 2, 298–300. [Google Scholar]
- Dobbin, K.K.; Simon, R.M. Optimally splitting cases for training and testing high dimensional classifiers. BMC Med. Genom. 2011, 4, 31. [Google Scholar] [CrossRef] [PubMed]
- Wannenburg, J.; Malekian, R. Physical activity recognition from smartphone accelerometer data for user context awareness sensing. IEEE Trans. Syst. Man Cybern. Syst. 2016, 1–8. [Google Scholar] [CrossRef]
Study | Behavioral Biometrics Approach | Classifier | Feature Set |
---|---|---|---|
Yang et al. [11], 2013 | Hand waving using linear accelerometer | - | Sampling interval, acceleration along x, y and z axes |
Shrestha et al. [41], 2015 | Hand wavingusing ambient light sensor | SVM [42] | Timestamps, light intensity, hand wave gesture duration |
Draffin et al. [8], 2014 | Keystroke biometrics | Neural Network Classifier [43] | Location pressed on key, length of press, size of touched area, drift |
Feng et al. [44], 2013 | Keystroke biometrics | Decision Tree [38], Bayes Net [39] Random Forest [45], | - |
Frank et al. [14], 2013 | Touchscreen interactions | SVM [42], K-NN [46], | - |
Shahzad et al. [47], 2012 | Touchscreen interactions | - | - |
Derawi et al. [48], 2010 | Gait biometrics using smartphone sensors | DTW [49] | Time interpolation, Average cycle length |
Mantyjarvi et al. [50], 2005 | Gait biometrics using accelerometer | - | Acceleration along x, y and z axes, 10 bin FFT histograms |
Clarke and Mekala et al. [51], 2007 | Dynamic signatures by typing words | - | - |
Sae-Bae [52], 2014 | Line signature drawn with fingertip | DTW [49], | - |
Kunz et al. [53], 2011 | Speaker verification during ongoing phone call | HMMs [54] | - |
Das et al. [55], 2008 | Speaker’s identification based on speech dynamics | DTW [49] | - |
Kambourakis et al. [56], 2014 | Behavioral profiling | MLP [40], Random Forest [45], K-NN [46] | Hold time, inter-time, speed, distance |
Behavioral Biometric Approach | Limitations |
---|---|
Hand waving Patterns and Gestures |
|
Keystroke Dynamics |
|
Touchscreen Interactions |
|
Handwriting and Signatures |
|
Voice |
|
Gait Patterns |
|
Behavioral Profiling |
|
Feature | Symbol | Formula | Domain |
---|---|---|---|
Max. Amplitude | Time | ||
Min. Amplitude | Time | ||
Mean | Time | ||
Variance | Time | ||
Kurtosis | Time | ||
Skewness | Time | ||
Peak-to-Peak Signal Value | Time | ||
Peak-to-Peak Time | Time | ||
Peak-to-Peak Slope | Time | ||
Absolute Latency to Amplitude Ratio | Time | ||
Energy | Freq. | ||
Entropy | Freq. |
Activity | K = 2 | K = 3 | K = 4 | K = 5 | K = 6 | Body Position |
---|---|---|---|---|---|---|
Walking | 0.74 | 0.75 | 0.63 | 0.51 | 0.50 | Waist |
0.81 | 0.84 | 0.76 | 0.57 | 0.56 | Left Thigh | |
0.71 | 0.72 | 0.67 | 0.58 | 0.49 | Right Thigh | |
0.79 | 0.80 | 0.73 | 0.63 | 0.60 | Upper Arm | |
0.80 | 0.87 | 0.65 | 0.51 | 0.40 | Wrist | |
Sitting | 0.64 | 0.73 | 0.58 | 0.46 | 0.43 | Waist |
0.68 | 0.70 | 0.63 | 0.50 | 0.45 | Left Thigh | |
0.80 | 0.84 | 0.76 | 0.51 | 0.50 | Right Thigh | |
0.71 | 0.79 | 0.60 | 0.51 | 0.49 | Upper Arm | |
0.64 | 0.71 | 0.56 | 0.40 | 0.20 | Wrist | |
Standing | 0.61 | 0.70 | 0.53 | 0.41 | 0.43 | Waist |
0.71 | 0.80 | 0.72 | 0.61 | 0.60 | Left Thigh | |
0.54 | 0.75 | 0.51 | 0.33 | 0.31 | Right Thigh | |
0.61 | 0.61 | 0.44 | 0.32 | 0.30 | Upper Arm | |
0.74 | 0.80 | 0.65 | 0.50 | 0.48 | Wrist | |
Running | 0.54 | 0.60 | 0.43 | 0.36 | 0.35 | Waist |
0.79 | 0.86 | 0.76 | 0.57 | 0.50 | Left Thigh | |
0.51 | 0.65 | 0.41 | 0.21 | 0.21 | Right Thigh | |
0.46 | 0.75 | 0.62 | 0.41 | 0.41 | Upper Arm | |
0.84 | 0.87 | 0.70 | 0.50 | 0.49 | Wrist | |
Sitting | 0.64 | 0.73 | 0.58 | 0.46 | 0.43 | Waist |
0.68 | 0.70 | 0.63 | 0.50 | 0.45 | Left Thigh | |
0.80 | 0.84 | 0.76 | 0.51 | 0.50 | Right Thigh | |
0.71 | 0.79 | 0.60 | 0.51 | 0.49 | Upper Arm | |
0.64 | 0.71 | 0.56 | 0.40 | 0.20 | Wrist | |
Walking Upstairs | 0.71 | 0.79 | 0.63 | 0.56 | 0.49 | Waist |
0.82 | 0.82 | 0.73 | 0.54 | 0.50 | Left Thigh | |
0.77 | 0.81 | 0.70 | 0.61 | 0.60 | Right Thigh | |
0.70 | 0.75 | 0.51 | 0.44 | 0.40 | Upper Arm | |
0.51 | 0.61 | 0.46 | 0.25 | 0.24 | Wrist | |
Walking Downstairs | 0.81 | 0.88 | 0.73 | 0.58 | 0.40 | Waist |
0.79 | 0.77 | 0.67 | 0.57 | 0.53 | Left Thigh | |
0.72 | 0.76 | 0.61 | 0.40 | 0.31 | Right Thigh | |
0.51 | 0.55 | 0.62 | 0.31 | 0.26 | Upper Arm | |
0.67 | 0.71 | 0.56 | 0.47 | 0.45 | Wrist |
Classifier | Average Accuracy % | Kappa | F-Measure | MAE | RMSE | Body Position |
---|---|---|---|---|---|---|
Decision Tree | 96.23 | 0.99 | 0.96 | 0.012 | 0.111 | Waist |
K-NN | 92.53 | 0.91 | 0.92 | 0.025 | 0.157 | |
Bayes Net | 97.55 | 0.97 | 0.97 | 0.008 | 0.088 | |
SVM | 99.71 | 1.00 | 0.99 | 0.222 | 0.310 | |
Decision Tree | 98.90 | 0.98 | 0.99 | 0.004 | 0.067 | Left Thigh |
K-NN | 95.23 | 0.94 | 0.95 | 0.016 | 0.125 | |
Bayes Net | 98.57 | 0.98 | 0.98 | 0.005 | 0.061 | |
SVM | 99.81 | 1.00 | 1.00 | 0.222 | 0.310 | |
Decision Tree | 97.87 | 0.97 | 0.98 | 0.007 | 0.083 | Right Thigh |
K-NN | 95.23 | 0.94 | 0.95 | 0.016 | 0.125 | |
Bayes Net | 98.01 | 0.97 | 0.98 | 0.006 | 0.080 | |
SVM | 99.47 | 0.99 | 0.99 | 0.222 | 0.310 | |
Decision Tree | 95.93 | 0.95 | 0.96 | 0.014 | 0.121 | Upper Arm |
K-NN | 92.58 | 0.91 | 0.95 | 0.025 | 0.157 | |
Bayes Net | 95.45 | 0.94 | 0.95 | 0.015 | 0.115 | |
SVM | 98.75 | 0.98 | 0.99 | 0.222 | 0.310 | |
Decision Tree | 95.18 | 0.94 | 0.95 | 0.017 | 0.124 | Wrist |
K-NN | 90.93 | 0.89 | 0.91 | 0.031 | 0.173 | |
Bayes Net | 96.85 | 0.96 | 0.97 | 0.015 | 0.100 | |
SVM | 98.18 | 0.97 | 0.98 | 0.222 | 0.311 |
Classifier | Average Accuracy % | Kappa | F-Measure | MAE | RMSE |
---|---|---|---|---|---|
Decision Tree | 96.82 | 0.96 | 0.96 | 0.010 | 0.102 |
K-NN | 93.30 | 0.91 | 0.93 | 0.022 | 0.147 |
Bayes Net | 97.38 | 0.96 | 0.97 | 0.027 | 0.086 |
SVM | 99.18 | 0.98 | 0.99 | 0.222 | 0.310 |
Scenario | No. of Users in Fold-1 | No. of Users in Fold-2 | No. of Users in Fold-3 |
---|---|---|---|
A | 2 | 4 | 4 |
B | 2 | 3 | 5 |
C | 3 | 3 | 4 |
D | 3 | 4 | 3 |
E | 4 | 3 | 3 |
User Class | TPR | FPR | Precision | Recall | F-Measure | Body Position |
---|---|---|---|---|---|---|
Authenticated | 0.90 | 0.04 | 0.90 | 0.90 | 0.90 | Waist |
Supplementary | 0.91 | 0.03 | 0.92 | 0.91 | 0.91 | |
Impostor | 0.95 | 0.04 | 0.93 | 0.95 | 0.94 | |
Authenticated | 0.92 | 0.04 | 0.90 | 0.91 | 0.90 | Left Thigh |
Supplementary | 0.90 | 0.03 | 0.92 | 0.90 | 0.91 | |
Impostor | 0.91 | 0.05 | 0.91 | 0.90 | 0.91 | |
Authenticated | 0.90 | 0.04 | 0.89 | 0.90 | 0.90 | Right Thigh |
Supplementary | 0.88 | 0.04 | 0.89 | 0.88 | 0.88 | |
Impostor | 0.91 | 0.06 | 0.90 | 0.91 | 0.90 | |
Authenticated | 0.85 | 0.06 | 0.86 | 0.85 | 0.85 | Upper Arm |
Supplementary | 0.86 | 0.06 | 0.85 | 0.86 | 0.86 | |
Impostor | 0.86 | 0.09 | 0.86 | 0.86 | 0.86 | |
Authenticated | 0.82 | 0.07 | 0.83 | 0.82 | 0.82 | Wrist |
Supplementary | 0.83 | 0.06 | 0.85 | 0.83 | 0.84 | |
Impostor | 0.90 | 0.09 | 0.86 | 0.90 | 0.88 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ehatisham-ul-Haq, M.; Azam, M.A.; Loo, J.; Shuang, K.; Islam, S.; Naeem, U.; Amin, Y. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors 2017, 17, 2043. https://doi.org/10.3390/s17092043
Ehatisham-ul-Haq M, Azam MA, Loo J, Shuang K, Islam S, Naeem U, Amin Y. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors. 2017; 17(9):2043. https://doi.org/10.3390/s17092043
Chicago/Turabian StyleEhatisham-ul-Haq, Muhammad, Muhammad Awais Azam, Jonathan Loo, Kai Shuang, Syed Islam, Usman Naeem, and Yasar Amin. 2017. "Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing" Sensors 17, no. 9: 2043. https://doi.org/10.3390/s17092043
APA StyleEhatisham-ul-Haq, M., Azam, M. A., Loo, J., Shuang, K., Islam, S., Naeem, U., & Amin, Y. (2017). Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors, 17(9), 2043. https://doi.org/10.3390/s17092043