WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City
<p>Research methodology.</p> "> Figure 2
<p>WoX reference model. WoX simplifies the Application layer as it wraps the specific Presentation Objects (PO), Business Objects (BO) and Data Objects (DO) for each (OBServable) thing. By this way, it reduces the application volume.</p> "> Figure 3
<p>MOF model.</p> "> Figure 4
<p>Solution workflow.</p> "> Figure 5
<p>Example: Behavior graph after 1 day.</p> "> Figure 6
<p>Example: Behavior graph after 2 months.</p> "> Figure 7
<p>Example: Behavior graph after 4 months.</p> ">
Abstract
:1. Introduction
- to define the requirements of a habits-based behavioral biometric system as a CA layer for the smart city
- to define, implement and measure a ML block able to mine custom user habits from daily sensing data
- to perform a quantitative and qualitative evaluation of the overall system
2. Background and Previous Studies
2.1. WoX
- Virtual things, beside physical things, can be easily wired up. WoX concepts are close to the people’s understanding: everyone can design and deploy custom scenarios.
- WoX accelerates the development of applications, by taking care of the communication toward the heterogeneous IoT layer. It hides the communication protocol details, letting designers/developers concentrate on their business.
2.2. IoT Meta-Models
- The Human-Object-View metamodel: considers the human and the physical object both users of the IoT. To interact, a physical object must be able to hear, speak, think, inform about its being and change its being. These communication, calculation, information acquisition and activation capabilities are provided to the object by a device to which it is incorporated or connected. A physical entity can be a human or physical object.
- The Service-View metamodel: exposes, in the form of services, the functions of information acquisition, processing and embedded actions. Services provide the basis to allow a man and a physical object to interact.
- The Context-View metamodel: Such an interaction occurs in a context, i.e., any information useful to characterize an entity’s situation. An entity is a person, place or object that is relevant for the interaction.
- The Network-View metamodel: The exchange, as a result of an interaction, is made on top of a communication network, which is conceptualized in the Network-view meta-model
- The Location-View metamodel: The location of the man and/or object can affect such an exchange. This meta-model is aimed at designing both the localization of men and objects as well as their involvement in interaction.
- The IoT solution Implementation layer (M0), containing all the IoT devices that gather information from the real world (e.g., the temperature sensor);
- The IoT Solution Model layer (M1), virtualizing the IoT devices from the underlying layer (e.g., WoX);
- The IoT Meta-Model layer (M2), which generalizes the information and the interactions between the IoT layers;
- The Meta-Object Facility or IoT Meta-Meta-Model layer (M3).
2.3. WoX+
3. Proposed Method
3.1. Mining Process
- 1.
- the user interacts (directly and indirectly) with the IoT system;
- 2.
- ones per day, the IoT middleware sends all the user requests to a ML algorithm;
- 3.
- the ML algorithm extrapolates the user behavior from the user requests;
- 4.
- the extracted user behavior rules are sent to a rule player;
- 5.
- the rule player waits until a rule can be activated and executes it.
3.2. Machine-Learning Block
3.2.1. IoT Dataset Definition
- sensor identifier s_id
- date of interaction d
- time of interaction t
3.2.2. Parameters Definition
- Max time delay (max_t) is the max amount of time (in minutes) to consider two different nodes related;
- Similarity Max Delay (sim_max_del) is the max amount of time (in minutes) to consider equivalent two nodes with the same id.
- Multiplication factor (mult) is a value that scales older dataset information. It must be between 0 (ignore old values) and 1 (consider all values with the same weight).
- Minimum rule percentage (min_rule_perc) is the threshold value of the edge to overcome to be a rule.
- Minimum percentage (min_perc) is the threshold value below which the edge value is rounded to zero.
3.2.3. Behavior Graph Definition
3.2.4. Algorithm Definition
- constructor (Algorithm 1): the setup of all parameters and variables used in the algorithm;
- get_related_rows (Algorithm 2): returns the list of related nodes starting from a source node;
- get_node (Algorithm 3): if the input node does not exists, the algorithm creates it, otherwise returns the existing node;
- calculate_rules (Algorithm 4): the rules extractor starting by the graph generated;
- elaborate_day (Algorithm 5): the elaboration of a subset D(d) in a specific day, defined as
Algorithm 1 Constructor |
|
Algorithm 2 get_related_rows |
Input:, , Output:
|
Algorithm 3 get_node |
Input:
, Output:
|
Algorithm 4 calculate_rules |
Input:
Output:
|
Algorithm 5 elaborate_day |
Input:
Output:
|
3.3. Habits-Based Continuous Authentication Requirements
- 1.
- a sensed value should be independent from the specific device that generates the reading
- 2.
- mined habits should be identifiable over different physical setups
- 3.
- a habits-matching layer should be flexible enough to recognize with a certain precision a typical habit even if not all the exact conditions occur
- 4.
- authorization-based services should be informed about the opening (or closing) of a secure session for a specific user, fired by the detection of a habit
- 5.
- both temporal and spatial information should be provided to open a contextual secure session in time and space
- 6.
- the user should tell authorization-based services who s/he claims to be, prior to use the service in frictionless mode
- 7.
- the way the user claims to be himself should be constant among the different auth-based scenarios
- 8.
- the way the user claims to be himself should be independent from the media used (i.e., mobile-based BLE or WiFi, smartcard)
- 9.
- a spatio-temporal matching engine should fuzzy-match different units of time (e.g., weekdays, months, a nth part of the month, seasons) and taxonomies of locations, both hierarchical (e.g., town-city-province-state) and flat (e.g., beaches, parking lot)
4. Functional and Quantitative Validation
4.1. Scenario
- 1.
- What is a spending habit you have that you think an IoT layer could capture?
- 2.
- What is a different context that you expect such an intelligent IoT layer should match with the spending habit you described, to automatize the payment?
- 3.
- What is a security-related scenario that could exploit the occurrence of your habit to provide a frictionless experience?
4.2. Synthetic Data Generation
- We have defined a set of rules R;
- We have generated a dataset with the interactions defined in the rules and a random-generated noise interactions;
- We have trained the algorithm and we have taken the resulting rules;
- We have compared these results with R.
- action_delta_minutes is the delay time (in minutes) between two actions in the same rule;
- action_probability is the probability to generate an action to the dataset;
- noise_sensors is the number of random interactions to generate;
- noise_occurrences is the number of occurrences of a noise sensor for each day;
- noise_probability is the probability to generate a noise sensor;
- time_scale is the variance of the Gaussian function used to generate the interaction instant.
- : 1, 2 and 4 min;
- : 90%, 95%;
- : 5, 10, 20;
- : 3, 5;
- 30%, 50%, 70%.
- : 500.
- : 300 min;
- : 24 h;
- : 0.95;
- : 0.8;
- : 0.25.
Sample Behavior Graph Visualization
- decalc_warn is the IoT signal that the coffee machine needs the decalcifier;
- buy_decalc is the IoT signal that the user buys the decalcifier;
- interaction_1 is a noise sensor that is not involved in this particular behavior.
{ "triggers": [ { "tn": "decalc\_warn", "av": "TRUE", "cr", "=" } ], "actions": [ { "tn": "buy\_decalc", "pv": "TRUE" } ] }
4.3. Habits Mining Validation Definition and Results
- we find, if exists, a rule similar to ;
- if does not exists, the score is 0;
- if the trigger of is equal to the trigger of , the score starts from 2;
- if the trigger of is different to the trigger of but appears into the list of actions of , the score starts from 1;
- if the trigger of is different to the trigger of but appears into the list of actions of with different starting time, the score starts from 0.5;
- for each action of , if it exists in the list of actions of , we add 0.5 to the score.
5. Discussion
Performance Discussion
6. Conclusions
- the first is that mining user habits can automatize actions related to security aspects;
- the second is that the occurrence of the habit can be used as a proof of the user’s identity, and then unlock the frictionless fruition of secured services in the smart city.
- there is no difference between weekdays and holidays;
- the system is not able to find periodical events or seasonal behavior;
- the system generates rules strictly related to the datetime information;
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
data | IoT data sent to the system |
M | WoX+ Model |
cr | WoX+ trigger criteria |
s_id | Sensor identifier |
d | Interaction date |
t | Interaction time |
max_t | Max time delay |
sim_max_del | SImilarity Max Delay |
mult | Multiplication factor |
min_rule_perc | Minimum rule percentage |
min_perc | Minimum percentage |
n | Node |
I(i, j, d) | Interaction |
E(i, j, d) | Edge |
D(d) | Subset of dataset with date as d |
References
- Bera, B.; Das, A.K.; Balzano, W.; Medaglia, C.M. On the design of biometric-based user authentication protocol in smart city environment. Pattern Recognit. Lett. 2020, 138, 439–446. [Google Scholar] [CrossRef]
- Chinnasamy, P.; Vinothini, C.; Arun Kumar, S.; Allwyn Sundarraj, A.; Annlin Jeba, S.; Praveena, V. Blockchain Technology in Smart-Cities. In Blockchain Technology: Applications and Challenges; Springer: Berlin/Heidelberg, Germany, 2021; pp. 179–200. [Google Scholar]
- Oliveira, T.A.; Oliver, M.; Ramalhinho, H. Challenges for connecting citizens and smart cities: ICT, e-governance and blockchain. Sustainability 2020, 12, 2926. [Google Scholar] [CrossRef]
- Distante, C.; Fineo, L.; Mainetti, L.; Manco, L.; Taccardi, B.; Roberto, V. HF-SCA: Hands Free Strong Customer Authentication based on a memory-guided attention mechanisms. J. Risk Financ. Manag. 2022, 15, 342. [Google Scholar] [CrossRef]
- Belanche-Gracia, D.; Casaló-Ariño, L.V.; Pérez-Rueda, A. Determinants of multi-service smartcard success for smart cities development: A study based on citizens’ privacy and security perceptions. Gov. Inf. Q. 2015, 32, 154–163. [Google Scholar] [CrossRef]
- Kadłubek, M.; Thalassinos, E.; Domagała, J.; Grabowska, S.; Saniuk, S. Intelligent Transportation System Applications and Logistics Resources for Logistics Customer Service in Road Freight Transport Enterprises. Energies 2022, 15, 4668. [Google Scholar] [CrossRef]
- Paiva, S.; Ahad, M.A.; Tripathi, G.; Feroz, N.; Casalino, G. Enabling technologies for urban smart mobility: Recent trends, opportunities and challenges. Sensors 2021, 21, 2143. [Google Scholar] [CrossRef]
- Butler, L.; Yigitcanlar, T.; Paz, A. How can smart mobility innovations alleviate transportation disadvantage? Assembling a conceptual framework through a systematic review. Appl. Sci. 2020, 10, 6306. [Google Scholar] [CrossRef]
- Maldonado Silveira Alonso Munhoz, P.A.; da Costa Dias, F.; Kowal Chinelli, C.; Azevedo Guedes, A.L.; Neves dos Santos, J.A.; da Silveira e Silva, W.; Pereira Soares, C.A. Smart mobility: The main drivers for increasing the intelligence of urban mobility. Sustainability 2020, 12, 10675. [Google Scholar] [CrossRef]
- Fachechi, A.; Mainetti, L.; Palano, L.; Patrono, L.; Stefanizzi, M.L.; Vergallo, R.; Chu, P.; Gadh, R. A new vehicle-to-grid system for battery charging exploiting IoT protocols. In Proceedings of the 2015 IEEE International Conference on Industrial Technology (ICIT), Seville, Spain, 17–19 March 2015; pp. 2154–2159. [Google Scholar]
- Ghasempour, A. Internet of things in smart grid: Architecture, applications, services, key technologies, and challenges. Inventions 2019, 4, 22. [Google Scholar] [CrossRef]
- Espe, E.; Potdar, V.; Chang, E. Prosumer communities and relationships in smart grids: A literature review, evolution and future directions. Energies 2018, 11, 2528. [Google Scholar] [CrossRef] [Green Version]
- Buckman, A.H.; Mayfield, M.; Beck, S.B. What is a smart building? Smart Sustain. Built Environ. 2014, 3, 92–109. [Google Scholar] [CrossRef]
- Apanaviciene, R.; Vanagas, A.; Fokaides, P.A. Smart building integration into a smart city (SBISC): Development of a new evaluation framework. Energies 2020, 13, 2190. [Google Scholar] [CrossRef]
- Verma, A.; Prakash, S.; Srivastava, V.; Kumar, A.; Mukhopadhyay, S.C. Sensing, controlling, and IoT infrastructure in smart building: A review. IEEE Sens. J. 2019, 19, 9036–9046. [Google Scholar] [CrossRef]
- Lobaccaro, G.; Carlucci, S.; Löfström, E. A review of systems and technologies for smart homes and smart grids. Energies 2016, 9, 348. [Google Scholar] [CrossRef]
- Capodieci, A.; Mainetti, L.; Panarese, P. Ambient Assisted Living for Elderly People Using Smart Personal Assistants. In Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 12–14 December 2018; pp. 935–940. [Google Scholar]
- Panarese, P.; Meraglia, E.; Vergallo, R.; Mainetti, L. Enhancing Voice Assistants: A Proactive Approach. In Proceedings of the 2021 6th International Conference on Smart and Sustainable Technologies (SpliTech), Bol and Split, Croatia, 8–11 September 2021; pp. 1–4. [Google Scholar]
- Mainetti, L.; Manco, L.; Patrono, L.; Secco, A.; Sergi, I.; Vergallo, R. An ambient assisted living system for elderly assistance applications. In Proceedings of the 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spain, 4–8 September 2016; pp. 1–6. [Google Scholar]
- Rimmer, V.; Preuveneers, D.; Joosen, W.; Mustafa, M.A.; Abidin, A.; Rúa, E.A. Frictionless authentication systems: Emerging trends, Research challenges and opportunities. arXiv 2018, arXiv:1802.07233. [Google Scholar]
- Marmion, V. Exploring Identity Assurance as a Complex System. Ph.D. Thesis, University of Southampton, Southampton, UK, 2021. [Google Scholar]
- Xiao, Y.; Varvello, M. FIAT: Frictionless authentication of IoT traffic. In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Germany, 7–10 December 2021; pp. 483–484. [Google Scholar]
- Sacaleanu, R.; Tak, E. PSD2 Secure Customer Authentication and customer experience: Ensuring a positive impact. J. Digit. Bank. 2020, 5, 146–154. [Google Scholar]
- Bhattacharyya, D.; Ranjan, R.; Alisherov, F.; Choi, M. Biometric authentication: A review. Int. J. U E Serv. Sci. Technol. 2009, 2, 13–28. [Google Scholar]
- Manimuthu, A.; Dharshini, V.; Zografopoulos, I.; Priyan, M.; Konstantinou, C. Contactless technologies for smart cities: Big data, IoT, and cloud infrastructures. SN Comput. Sci. 2021, 2, 1–24. [Google Scholar] [CrossRef]
- Preuveneers, D.; Joosen, W. SmartAuth: Dynamic context fingerprinting for continuous user authentication. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, 13–17 April 2015; pp. 2185–2191. [Google Scholar]
- Ekiz, D.; Can, Y.S.; Dardagan, Y.C.; Ersoy, C. Can a smartband be used for continuous implicit authentication in real life. IEEE Access 2020, 8, 59402–59411. [Google Scholar] [CrossRef]
- Zhang, Y.; Hu, W.; Xu, W.; Chou, C.T.; Hu, J. Continuous authentication using eye movement response of implicit visual stimuli. Proc. ACM Interact. Mobile Wearable Ubiquitous Technol. 2018, 1, 1–22. [Google Scholar] [CrossRef]
- James, T.; Pirim, T.; Boswell, K.; Reithel, B.; Barkhi, R. Determining the intention to use biometric devices: An application and extension of the technology acceptance model. J. Organ. End User Comput. (JOEUC) 2006, 18, 1–24. [Google Scholar] [CrossRef]
- Ho, G.; Stephens, G.; Jamieson, R. Biometric Authentication Adoption Issues 2003. Available online: https://aisel.aisnet.org/acis2003/11/ (accessed on 31 July 2022).
- Mahfouz, A.; Mahmoud, T.M.; Eldin, A.S. A survey on behavioral biometric authentication on smartphones. J. Inf. Secur. Appl. 2017, 37, 28–37. [Google Scholar] [CrossRef]
- Sitová, Z.; Šeděnka, J.; Yang, Q.; Peng, G.; Zhou, G.; Gasti, P.; Balagani, K.S. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 2015, 11, 877–892. [Google Scholar] [CrossRef]
- Liang, Y.; Samtani, S.; Guo, B.; Yu, Z. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet Things J. 2020, 7, 9128–9143. [Google Scholar] [CrossRef]
- Cao, H.; Bao, T.; Yang, Q.; Chen, E.; Tian, J. An effective approach for mining mobile user habits. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management, Toronto, ON, Canada, 26–30 October 2010; pp. 1677–1680. [Google Scholar]
- Ma, H.; Cao, H.; Yang, Q.; Chen, E.; Tian, J. A habit mining approach for discovering similar mobile users. In Proceedings of the 21st International Conference on World Wide Web, Lyon, France, 16–20 April 2012; pp. 231–240. [Google Scholar]
- Dimaggio, M.; Leotta, F.; Mecella, M.; Sora, D. Process-based habit mining: Experiments and techniques. In Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, 18–21 July 2016; pp. 145–152. [Google Scholar]
- Machani, S.; Field, N. Choosing FIDO Authenticators for Enterprise Use Cases. In FIDO Alliance White Paper; FIDO ALLIANCE: Wakefield, MA, USA, 2022. [Google Scholar]
- Caione, A.; Fiore, A.; Mainetti, L.; Manco, L.; Vergallo, R. WoX: Model-driven development of web of things applications. In Managing the Web of Things; Elsevier: Amsterdam, The Netherlands, 2017; pp. 357–387. [Google Scholar]
- Ben Hassine, T.; Khayati, O.; Ben Ghezala, H. An IoT domain meta-model and an approach to software development of IoT solutions. In Proceedings of the 2017 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), Gafsa, Tunisia, 20–22 October 2017; pp. 32–37. [Google Scholar] [CrossRef]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016; Available online: http://www.deeplearningbook.org (accessed on 31 July 2022).
- Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning; Springer Series in Statistics; Springer New York Inc.: New York, NY, USA, 2001. [Google Scholar]
- Wang, C.; Xiong, R.; Tian, J.; Lu, J.; Zhang, C. Rapid ultracapacitor life prediction with a convolutional neural network. Appl. Energy 2022, 305, 117819. [Google Scholar] [CrossRef]
- Wang, S.; Ren, P.; Takyi-Aninakwa, P.; Jin, S.; Fernandez, C. A Critical Review of Improved Deep Convolutional Neural Network for Multi-Timescale State Prediction of Lithium-Ion Batteries. Energies 2022, 15, 5053. [Google Scholar] [CrossRef]
- Cho, J.H.; Moon, J.W. Integrated artificial neural network prediction model of indoor environmental quality in a school building. J. Clean. Prod. 2022, 344, 131083. [Google Scholar] [CrossRef]
- Ishfaque, M.; Dai, Q.; Haq, N.U.; Jadoon, K.; Shahzad, S.M.; Janjuhah, H.T. Use of Recurrent Neural Network with Long Short-Term Memory for Seepage Prediction at Tarbela Dam, KP, Pakistan. Energies 2022, 15, 3123. [Google Scholar] [CrossRef]
- Cheng, Y.; Wang, C.; Wu, J.; Zhu, H.; Lee, C. Multi-dimensional recurrent neural network for remaining useful life prediction under variable operating conditions and multiple fault modes. Appl. Soft Comput. 2022, 118, 108507. [Google Scholar] [CrossRef]
- Melo, N.; Lee, J.; Suzuki, R. Identification of the User’s Habits based on Activity Information. In Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Madrid, Spain, 1–5 October 2018; pp. 2014–2019. [Google Scholar] [CrossRef]
- Baig, A.F.; Eskeland, S. Security, privacy, and usability in continuous authentication: A survey. Sensors 2021, 21, 5967. [Google Scholar] [CrossRef]
- Abeni, P.; Baltatu, M.; D’Alessandro, R. Nis03-4: Implementing biometrics-based authentication for mobile devices. In Proceedings of the IEEE Globecom 2006, San Francisco, CA, USA, 27 November 2006–1 December 2006. [Google Scholar]
- Crouse, D.; Han, H.; Chandra, D.; Barbello, B.; Jain, A. Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data. In Proceedings of the 2015 International Conference on Biometrics (ICB), Phuket, Thailand, 19–22 May 2015; pp. 135–142. [Google Scholar] [CrossRef]
- Hadid, A.; Heikkilä, J.; Silven, O.; Pietikäinen, M. Face and eye detection for person authentication in mobile phones. In Proceedings of the 2007 First ACM/IEEE International Conference on Distributed Smart Cameras, Vienna, Austria, 25–28 September 2007; pp. 101–108. [Google Scholar] [CrossRef]
- Samangouei, P.; Patel, V.; Chellappa, R. Facial attributes for active authentication on mobile devices. Image Vis. Comput. 2017, 58, 181–192. [Google Scholar] [CrossRef]
- Perera, P.; Patel, V. Face-based multiple user active authentication on mobile devices. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1240–1250. [Google Scholar] [CrossRef]
- Kudinov, A.; Elsakov, S. Improved continuous authentication system with counterfeit protection. J. Comput. Eng. Math 2019, 6, 35–47. [Google Scholar] [CrossRef]
- Feng, H.; Fawaz, K.; Shin, K. Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom ’17), Snowbird, UT, USA, 16–20 October 2017; Volume Part F131210, pp. 343–355. [Google Scholar] [CrossRef]
- Miguel-Hurtado, O.; Blanco-Gonzalo, R.; Guest, R.; Lunerti, C. Interaction evaluation of a mobile voice authentication system. In Proceedings of the 2016 IEEE International Carnahan Conference on Security Technology (ICCST), Orlando, FL, USA, 24–27 October 2016. [Google Scholar] [CrossRef]
- Zhang, L.; Tan, S.; Yang, J. Hearing Your Voice is Not Enough: An Articulatory gesture based liveness detection for voice authentication. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS ’17), Dallas, TX, USA, 30 October–3 November 2017; pp. 57–71. [Google Scholar] [CrossRef]
- Yan, Z.; Zhao, S. A Usable Authentication System Based on Personal Voice Challenge. In Proceedings of the 2016 International Conference on Advanced Cloud and Big Data (CBD), Chengdu, China, 13–16 August 2016; pp. 194–199. [Google Scholar] [CrossRef]
- Zhang, L.; Tan, S.; Yang, J.; Chen, Y. VoiceLive: A phoneme localization based liveness detection for voice authentication on smartphones. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016 (CCS ’16), Vienna, Austria, 24–28 October 2016; pp. 1080–1091. [Google Scholar] [CrossRef]
- Nakanishi, I.; Baba, S.; Miyamoto, C. EEG based biometric authentication using new spectral features. In Proceedings of the 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kanazawa, Japan, 7–9 January 2009; pp. 651–654. [Google Scholar] [CrossRef] [Green Version]
- Miyamoto, C.; Baba, S.; Nakanishi, I. Biometric person authentication using new spectral features of electroencephalogram (EEG). In Proceedings of the 2008 International Symposium on Intelligent Signal Processing and Communications Systems, Bangkok, Thailand, 8–11 February 2009. [Google Scholar] [CrossRef]
- Das, R.; Maiorana, E.; Campisi, P. EEG Biometrics Using Visual Stimuli: A Longitudinal Study. IEEE Signal Process. Lett. 2016, 23, 341–345. [Google Scholar] [CrossRef]
- Louis, W.; Komeili, M.; Hatzinakos, D. Continuous authentication using One-Dimensional Multi-Resolution Local Binary Patterns (1DMRLBP) in ECG biometrics. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2818–2832. [Google Scholar] [CrossRef]
- Coutinho, D.; Fred, A.; Figueiredo, M. ECG-based continuous authentication system using adaptive string matching. In Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, Rome, Italy, 26–29 January 2011; pp. 354–359. [Google Scholar]
- Camara, C.; Peris-Lopez, P.; Gonzalez-Manzano, L.; Tapiador, J. Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. J. 2018, 68, 784–794. [Google Scholar] [CrossRef]
- Song, C.; Wang, A.; Ren, K.; Xu, W. EyeVeri: A secure and usable approach for smartphone user authentication. In Proceedings of the IEEE INFOCOM 2016—The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016. [Google Scholar] [CrossRef]
- Zhang, F.; Zhang, D.; Xiong, J.; Wang, H.; Niu, K.; Jin, B.; Wang, Y. From fresnel diffraction model to fine-grained human respiration sensing with commodity wi-fi devices. In Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers (UbiComp ’18), Singapore, 8–12 October 2018. [Google Scholar]
- Eberz, S.; Lovisotto, G.; Rasmussen, K.; Lenders, V.; Martinovic, I. 28 blinks later: Tackling practical challenges of eye movement biometrics. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), London, UK, 11–15 November 2019; pp. 1187–1199. [Google Scholar] [CrossRef]
- Ehatisham-ul Haq, M.; Awais Azam, M.; Naeem, U.; Amin, Y.; Loo, J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 2018, 109, 24–35. [Google Scholar] [CrossRef]
- Saied, M.; Elshenawy, A.; Ezz, M. A Novel Approach for Improving Dynamic Biometric Authentication and Verification of Human Using Eye Blinking Movement. Wirel. Pers. Commun. 2020, 115, 859–876. [Google Scholar] [CrossRef]
- Mosenia, A.; Sur-Kolay, S.; Raghunathan, A.; Jha, N. CABA: Continuous Authentication Based on BioAura. IEEE Trans. Comput. 2017, 66, 759–772. [Google Scholar] [CrossRef]
- Zhang, X.; Yao, L.; Huang, C.; Gu, T.; Yang, Z.; Liu, Y. DeepKey: An EEG and Gait Based Dual-Authentication System. arXiv 2017, arXiv:1706.01606. [Google Scholar]
- Barra, S.; Casanova, A.; Fraschini, M.; Nappi, M. Fusion of physiological measures for multimodal biometric systems. Multimed. Tools Appl. 2017, 76, 4835–4847. [Google Scholar] [CrossRef]
- Sim, T.; Zhang, S.; Janakiraman, R.; Kumar, S. Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 2007, 29, 687–700. [Google Scholar] [CrossRef] [PubMed]
- Su, F.; Xia, L.; Cai, A.; Ma, J. A dual-biometric-modality identification system based on fingerprint and EEG. In Proceedings of the 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, USA, 27–29 September 2010. [Google Scholar] [CrossRef]
- McCool, C.; Marcel, S.; Hadid, A.; Pietikäinen, M.; Matějka, P.; Černocký, J.; Poh, N.; Kittler, J.; Larcher, A.; Lévy, C.; et al. Bi-modal person recognition on a mobile phone: Using mobile phone data. In Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, Melbourne, VIC, Australia, 9–13 July 2012; pp. 635–640. [Google Scholar] [CrossRef]
- Abo-Zahhad, M.; Ahmed, S.; Abbas, S. A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognit. Lett. 2016, 82, 216–225. [Google Scholar] [CrossRef]
- Wang, M.; Abbass, H.; Hu, J. Continuous authentication using EEG and face images for trusted autonomous systems. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 368–375. [Google Scholar] [CrossRef]
- Derawi, M.; Nickely, C.; Bours, P.; Busch, C. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 15–17 October 2010; pp. 306–311. [Google Scholar] [CrossRef]
- Mäntyjärvi, J.; Lindholm, M.; Vildjiounaite, E.; Mäkelä, S.M.; Ailisto, H. Identifying users of portable devices from gait pattern with accelerometers. In Proceedings of the (ICASSP ’05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, Philadelphia, PA, USA, 23–23 March 2005; Volume II, pp. II973–II976. [Google Scholar] [CrossRef]
- Gafurov, D.; Snekkenes, E. Gait recognition using wearable motion recording sensors. Eurasip J. Adv. Signal Process. 2009, 2009, 415817. [Google Scholar] [CrossRef]
- Hoang, T.; Nguyen, T.; Luong, C.; Do, S.; Choi, D. Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 2013, 9, 333–348. [Google Scholar] [CrossRef]
- Muaaz, M.; Mayrhofer, R. An analysis of different approaches to gait recognition using cell phone based accelerometers. In Proceedings of the International Conference on Advances in Mobile Computing & Multimedia (MoMM ’13), Vienna, Austria, 2–4 December 2013; pp. 293–300. [Google Scholar] [CrossRef]
- Wu, Z.; Huang, Y.; Wang, L.; Wang, X.; Tan, T. A Comprehensive Study on Cross-View Gait Based Human Identification with Deep CNNs. IEEE Trans. Pattern Anal. Mach. Intell. 2017, 39, 209–226. [Google Scholar] [CrossRef]
- Nickel, C.; Derawi, M.; Bours, P.; Busch, C. Scenario test of accelerometer-based biometric gait recognition. In Proceedings of the 2011 Third International Workshop on Security and Communication Networks (IWSCN), Gjovik, Norway, 18–20 May 2011; pp. 15–21. [Google Scholar] [CrossRef]
- Sun, Y.; Lo, B. An Artificial Neural Network Framework for Gait-Based Biometrics. IEEE J. Biomed. Health Inform. 2019, 23, 987–998. [Google Scholar] [CrossRef]
- Zhong, Y.; Deng, Y. Sensor orientation invariant mobile gait biometrics. In Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, FL, USA, 29 September 2014–2 October 2014. [Google Scholar] [CrossRef]
- Zhong, Y.; Deng, Y.; Meltzner, G. Pace independent mobile gait biometrics. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015. [Google Scholar] [CrossRef]
- Sae-Bae, N.; Ahmed, K.; Isbister, K.; Memon, N. Biometric-rich gestures: A novel approach to authentication on multi-touch devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12), Austin, TX, USA, 5–10 May 2012; pp. 977–986. [Google Scholar] [CrossRef]
- Rauen, Z.; Anjomshoa, F.; Kantarci, B. Gesture and Sociability-based Continuous Authentication on Smart Mobile Devices. In Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access (MobiWac’18); ACM: New York, NY, USA, 2018; pp. 51–58. [Google Scholar] [CrossRef]
- Govindarajan, S.; Gasti, P.; Balagani, K. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA, 29 September 2013–2 October 2013. [Google Scholar] [CrossRef]
- Zhao, X.; Feng, T.; Shi, W.; Kakadiaris, I. Mobile user authentication using statistical touch dynamics images. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1780–1789. [Google Scholar] [CrossRef]
- Feng, T.; Yang, J.; Yan, Z.; Tapia, E.; Shi, W. TIPS: Context-aware implicit user identification using touch screen in uncontrolled environments. In Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (HotMobile ’14), Santa Barbara, CA, USA, 26–27 February 2014. [Google Scholar] [CrossRef]
- Jain, A.; Kanhangad, V. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recognit. Lett. 2015, 68, 351–360. [Google Scholar] [CrossRef]
- Holz, C.; Knaust, M. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology (UIST ’15), Charlotte, NC, USA, 11–15 November 2015; pp. 303–312. [Google Scholar] [CrossRef]
- Ahmad, J.; Sajjad, M.; Jan, Z.; Mehmood, I.; Rho, S.; Baik, S. Analysis of interaction trace maps for active authentication on smart devices. Multimed. Tools Appl. 2017, 76, 4069–4087. [Google Scholar] [CrossRef]
- Meng, W.; Wang, Y.; Wong, D.; Wen, S.; Xiang, Y. TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 2018, 117, 1–9. [Google Scholar] [CrossRef]
- Liang, X.; Zou, F.; Li, L.; Yi, P. Mobile terminal identity authentication system based on behavioral characteristics. Int. J. Distrib. Sens. Netw. 2020, 16. [Google Scholar] [CrossRef]
- Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8, 136–148. [Google Scholar] [CrossRef]
- De Luca, A.; Hang, A.; Brudy, F.; Lindner, C.; Hussmann, H. Touch me once and i know it’s you! Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12), Austin, TX, USA, 5–10 May 2012; pp. 987–996. [Google Scholar] [CrossRef]
- Feng, T.; Liu, Z.; Kwon, K.A.; Shi, W.; Carbunar, B.; Jiang, Y.; Nguyen, N. Continuous mobile authentication using touchscreen gestures. In Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, USA, 13–15 November 2012; pp. 451–456. [Google Scholar] [CrossRef]
- Brocardo, M.; Traore, I.; Woungang, I. Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 2015, 81, 1429–1440. [Google Scholar] [CrossRef]
- Kaur, R.; Singh, S.; Kumar, H. TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks. Appl. Soft Comput. J. 2020, 97. [Google Scholar] [CrossRef]
- Brocardo, M.; Traore, I.; Woungang, I. Toward a framework for continuous authentication using stylometry. In Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, Victoria, BC, Canada, 13–16 May 2014; pp. 106–115. [Google Scholar] [CrossRef]
- Saevanee, H.; Clarke, N.; Furnell, S.; Biscione, V. Text-based active authentication for mobile devices. IFIP Adv. Inf. Commun. Technol. 2014, 428, 99–112. [Google Scholar] [CrossRef]
- Fridman, L.; Stolerman, A.; Acharya, S.; Brennan, P.; Juola, P.; Greenstadt, R.; Kam, M.; Gomez, F. Multi-modal decision fusion for continuous authentication. Comput. Electr. Eng. 2015, 41, 142–156. [Google Scholar] [CrossRef]
- Joyce, R.; Gupta, G. Identity Authentication Based on Keystroke Latencies. Commun. ACM 1990, 33, 168–176. [Google Scholar] [CrossRef]
- Gascon, H.; Uellenbeck, S.; Wolf, C.; Rieck, K. Continuous authentication on mobile devices by analysis of typing motion behavior. In Sicherheit 2014—Sicherheit, Schutz und Zuverlässigkeit; Katzenbeisser, S., Lotz, V., Weippl, E., Eds.; Gesellschaft für Informatik: Bonn, Germany, 2014. [Google Scholar]
- Giuffrida, C.; Majdanik, K.; Conti, M.; Bos, H. I sensed it was you: Authenticating mobile users with sensor-enhanced keystroke dynamics. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment; Springer: Berlin/Heidelberg, Germany, 2014; pp. 92–111. [Google Scholar]
- Cilia, D.; Inguanez, F. Multi-model authentication using keystroke dynamics for smartphones. In Proceedings of the 2018 IEEE 8th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin, Germany, 2–5 September 2018; pp. 1–6. [Google Scholar]
- Anusas-Amornkul, T. Strengthening password authentication using keystroke dynamics and smartphone sensors. In Proceedings of the 9th International Conference on Information Communication and Management, Prague, Czech Republic, 23–26 August 2019; pp. 70–74. [Google Scholar]
- Monrose, F.; Rubin, A.D. Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 2000, 16, 351–359. [Google Scholar] [CrossRef]
- Chang, T.Y.; Tsai, C.J.; Lin, J.H. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 2012, 85, 1157–1165. [Google Scholar] [CrossRef]
- Yazji, S.; Chen, X.; Dick, R.P.; Scheuermann, P. Implicit user re-authentication for mobile devices. In International Conference on Ubiquitous Intelligence and Computing; Springer: Berlin/Heidelberg, Germany, 2009; pp. 325–339. [Google Scholar]
- Gomi, H.; Yamaguchi, S.; Tsubouchi, K.; Sasaya, N. Continuous authentication system using online activities. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 522–532. [Google Scholar]
- Mahbub, U.; Komulainen, J.; Ferreira, D.; Chellappa, R. Continuous authentication of smartphones based on application usage. IEEE Trans. Biom. Behav. Identity Sci. 2019, 1, 165–180. [Google Scholar] [CrossRef]
- Neal, T.J.; Woodard, D.L.; Striegel, A.D. Mobile device application, bluetooth, and wi-fi usage data as behavioral biometric traits. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–6. [Google Scholar]
- Ying, J.J.C.; Chang, Y.J.; Huang, C.M.; Tseng, V.S. Demographic prediction based on users mobile behaviors. Mob. Data Chall. 2012, 2012, 1–4. [Google Scholar]
- Solomon, A.; Bar, A.; Yanai, C.; Shapira, B.; Rokach, L. Predict demographic information using word2vec on spatial trajectories. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP ’18), Singapore, 8–11 July 2018; pp. 331–339. [Google Scholar]
- Crivellari, A.; Beinat, E. From motion activity to geo-embeddings: Generating and exploring vector representations of locations, traces and visitors through large-scale mobility data. ISPRS Int. J. Geo-Inf. 2019, 8, 134. [Google Scholar] [CrossRef] [Green Version]
Habit ID | Habit Description | Expectation from WoX+ | Continuous Authentication Expectation |
---|---|---|---|
1 | Every 2 months, when the decalcification warning light on the coffee machine turns on, I buy the decalcifier on Amazon | I expect that if the decalcification warning light is on, the decalcifier should be automatically bought | I expect that if the decalcifier warning light is on and I have bought the decalcifier at the supermarket, I can also buy alcohol without showing my ID |
2 | At the end of the month, when I receive my salary, I pay the energy bill | I expect that if I receive extra money in a different day of the month, pending bills are automatically paid | I expect that if I am at Walmart and I’m paying the energy bill in any day of the month, I can book and pay my taxi without using the second factor authentication |
3 | Every business day, at 7:40 a.m. , 8:10 a.m. or 1:20 p.m. I buy the bus ticket on the company’s website | I expect that if I’m at the bus stop at 7:30 and I forgot to buy my ticket, the system should automatically buy it for me | I expect that if my parents are accompanying me at the University campus, I could move the price of the ticket to the digital piggy bank without authorizing the transaction |
4 | In the summer, during the weekend and when I come back from the beach, I buy the car’s perfume after washing the car at around 21:30 | I expect that, if I am at the washing car service after being at the beach, an automatic purchase should be triggered | I expect that if it is weekend and I am at the beach, the system should book and pay a washing service for me |
5 | When I go shopping, if I like a dress but my size is finished, in the late evening when the baby sleeps I search and buy the same dress on the Internet | I expect that if I am in a clothes shop and I scan the barcode of a dress, it should automatically put my size in the shopping cart | I expect that if I’m at home in the late night and I’m buying a cloth, I can order my dinner without the second step verification |
6 | When the car notifies me on the app that I reached the number of km for tires, I buy them | I expect that I should receive a list of quotations for different tires when the car reaches the km threshold | I expect that if I’m paying the tires after the notification from the app, I can book and pay a parking lot for the next day using Amazon Alexa |
7 | When I park the car near the bus stop, I buy the bus ticket | I expect that if I park the car near the bus stop, the bus ticket is automatically bought | I expect that if the parking lot is the one of the municipality, I can pay my taxes at the totem without inserting my password |
8 | In the summer, I buy 3 antiparos vials per month | I expect that if the average weather temperature is above a certain threshold, the antiparos are automatically bought | I expect that if I’m paying the antiparos at the pet shop and it is summer, then I can go to the bank branch beside the pet shop and interact with the ATM by only using my voice |
9 | Every tenth day of the month I send a bank transfer to pay my rent | I expect that, if there are enough money on my account, the rent will be paid automatically | I expect that if I a.m. at paying my rent on the 10th, I can login to the banking app without logging in |
10 | When the gasoline price is low, and around the beginning and the half of the month, I fill the tank | I expect that if I’m driving, the fuel price is low and the tank is below a certain threshold, the navigator app will suggest me the most convenient gas station | I expect that if I’m filling the tank in the most convenient gas station, than I can pay oil check without inserting the PIN |
IQR | |||
---|---|---|---|
1 | −0.6745 | 0.6745 | 1.349 |
50 | −33.725 | 33.725 | 67.45 |
100 | −67.45 | 67.45 | 134.9 |
500 | −337.25 | 337.25 | 674.5 |
Req ID | Requirement | Satisfied | Comment |
---|---|---|---|
1 | A sensed value should be independent from the specific device that generates the reading | Yes | WoX satisfies this requirement |
2 | Mined habits should be identifiable over different physical setups | Yes | WoX satisfies this requirement |
3 | A habits-matching layer should be flexible enough to recognize with a certain precision a typical habits even if not all the exact conditions occur | Yes | The ML block satisfies this requirement |
4 | Authorization-based services should be informed about the opening (or closing) of a secure session for a specific user, fired by the detection of a habit | Applicable | WoX satisfies this requirement, but it has not been tested yet |
5 | Both temporal and spatial information should be provided to open a contextual secure session in time and space | Applicable | Not yet provided |
6 | The user should tell authorization-based services who s/he claim to be, prior to use the service in frictionless mode | Applicable | Not yet implemented |
7 | The way the user claims to be himself should be constant among the different auth-based scenarios | Applicable | Not yet implemented |
8 | The way the user claims to be himself should be independent from the media used (i.e., mobile-based BLE or WiFi, smartcard) | Yes | WoX satisfies this requirement |
9 | A spatio-temporal matching engine should fuzzy-match different units of time and taxonomies of locations, both hierarchical and flat | Applicable | There are some already studied algorithms [47] satisfying this requirement. |
10 | Non personal sensing devices spread across the smart city should feed personal habits scenarios | No | It must be found a method for data incoming public IoT infrastructure to trigger user-specific rules |
CA type | Techniques | Studies | Obtrusiveness Discussion |
---|---|---|---|
Physiological | Face | [49,50,51,52,53,54] | User should stay still in front of camera |
Voice | [55,56,57,58,59] | User should talk, even if the use case does not foresee voice interaction | |
EEG | [60,61,62] | Electrodes must be placed on the user’s scalp | |
ECG | [63,64,65] | User must at least wear a wearable device (e.g., Apple Watch) | |
Eye movement | [66,67,68,69] | A still camera in front of user’s face is needed for eye tracking | |
Eye blink | [70] | As above | |
BioAura | [71] | Wearable medical devices should be continuously worn | |
Multimodal | [72,73,74,75,76,77,78] | A combination of the above methods is even more cumbersome | |
Behavioral | Motion Dynamics | [79,80,81,82,83,84,85,86,87,88] | Gait-based authentication is not so invasive if only a smartphone is needed. Anyway, a smartphone is always needed in the user’s pocket. |
Touch Dynamics | [89,90,91,92,93,94,95,96,97,98,99,100,101] | Limited to recognizing the user when a touch screen is involved (gestures, swipes, or tapping on the screen) | |
Stylometry Dynamics | [102,103,104,105,106] | Limited to use cases when writing is demanded to the user | |
Keystroke Dynamics | [107,108,109,110,111,112,113] | Limited to use cases where a keyboard (physical or virtual) is involved | |
Eye movement | [66,67,68,69] | Eye tracking equipment is needed | |
Eye blink | [70] | As above | |
BioAura | [71] | Wearable medical devices should be continuously worn | |
Context-based | File system, Network Access, GPS, Online activity, app usage, Bluetooth, Wi-Fi | [114,115,116,117,118,119,120] | Very close to this paper idea, no encumbrance, but the current studies do not include the interaction with smart environments |
WoX+ | User daily habits mined from smart environments like smart home and smart cities | This work | No obtrusiveness because the system adapts with any personal data source incoming from the environments |
ID | Number of Sensors | Number of Interactions | Mining Time (ms) |
---|---|---|---|
1 | 5 | 5 | 1275 |
2 | 5 | 10 | 2047 |
3 | 5 | 20 | 2236 |
4 | 5 | 50 | 4434 |
5 | 10 | 5 | 1490 |
6 | 10 | 10 | 1950 |
7 | 10 | 20 | 2398 |
8 | 10 | 50 | 4269 |
9 | 15 | 5 | 1164 |
10 | 15 | 10 | 2247 |
11 | 15 | 20 | 2718 |
12 | 15 | 50 | 3258 |
13 | 20 | 5 | 1402 |
14 | 20 | 10 | 2205 |
15 | 20 | 20 | 2944 |
16 | 20 | 50 | 3468 |
17 | 30 | 5 | 1102 |
18 | 30 | 10 | 1608 |
19 | 30 | 20 | 2824 |
20 | 30 | 50 | 3816 |
21 | 50 | 5 | 1331 |
22 | 50 | 10 | 1608 |
23 | 50 | 20 | 2266 |
24 | 50 | 50 | 3132 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mainetti, L.; Panarese, P.; Vergallo, R. WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City. Sensors 2022, 22, 6980. https://doi.org/10.3390/s22186980
Mainetti L, Panarese P, Vergallo R. WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City. Sensors. 2022; 22(18):6980. https://doi.org/10.3390/s22186980
Chicago/Turabian StyleMainetti, Luca, Paolo Panarese, and Roberto Vergallo. 2022. "WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City" Sensors 22, no. 18: 6980. https://doi.org/10.3390/s22186980
APA StyleMainetti, L., Panarese, P., & Vergallo, R. (2022). WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City. Sensors, 22(18), 6980. https://doi.org/10.3390/s22186980