Implicit authentication method for smartphone users based on rank aggregation and random forest

Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’ users run various essential applications (such as banking and e-health Apps), which contains very confidential information (e.g., credit card number and its PIN). Typically, the smartphone’s user aut...

Full description

Bibliographic Details
Main Authors: Mohamed W. Abo El-Soud, Tarek Gaber, Fayez AlFayez, Mohamed Meselhy Eltoukhy
Format: Article
Language:English
Published: Elsevier 2021-02-01
Series:Alexandria Engineering Journal
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1110016820303902
id doaj-4a0367aab79d4d91a29bf8447e80705d
record_format Article
spelling doaj-4a0367aab79d4d91a29bf8447e80705d2021-06-02T19:59:44ZengElsevierAlexandria Engineering Journal1110-01682021-02-01601273283Implicit authentication method for smartphone users based on rank aggregation and random forestMohamed W. Abo El-Soud0Tarek Gaber1Fayez AlFayez2Mohamed Meselhy Eltoukhy3Department of Computer Science and Information, College of Science, Majmaah University, Zulfi, Saudi Arabia; Faculty of Computers and Informatics, Suez Canal University, Ismailia 41522, EgyptSchool of Science, Engineering, and Environment, University of Salford, UK; Faculty of Computers and Informatics, Suez Canal University, Ismailia 41522, Egypt; Corresponding author at: School of Science, Engineering, and Environment, University of Salford, UK, and Faculty of Computers and Informatics, Suez Canal University, Ismailia, Egypt.Department of Computer Science and Information, College of Science, Majmaah University, Zulfi, Saudi ArabiaUniversity of Jeddah, College of Computing and Information Technology at Khulais, Department of Information Technology, Jeddah, Saudi Arabia; Faculty of Computers and Informatics, Suez Canal University, Ismailia 41522, EgyptCurrently, the smartphone devices have become an essential part of our daily activities. Smartphone’ users run various essential applications (such as banking and e-health Apps), which contains very confidential information (e.g., credit card number and its PIN). Typically, the smartphone’s user authentication is achieved using mechanisms (password or security pattern) to verify the user identity. Although these mechanisms are cheap, simple, and quick enough for frequent logins, they are vulnerable to attacks such as shoulder surfing or smudge attack. This problem could be addressed by authenticating the users using their behaviour (i.e., touch behaviour) while using their smartphones. Such behaviours include finger’s pressure, size, and pressure time while tapping keys. Selecting features (from these behaviours) could play an important role in the authentication process’s performance. This paper aims to propose an efficient authentication method providing an implicit authentication for smartphone users while not imposing an additional cost of special hardware and addressing the limited smartphone capabilities. We first investigated feature selection techniques from the filter and wrapper approaches and then used the best one to propose our implicit authentication method. The random forest classifier is used to evaluate these techniques. It is also used to achieve the classification task in our authentication method. Using a public dataset, the experimental results showed that the filter-based technique (i.e., rank aggregation) is the best feature selection to build an implicit authentication method for the smartphone environment. It showed accuracy results around 97.80% using only 25 features out of 53 features (i.e., require less mobile resources (memory and processing power) to authenticate users. At the same time, the results showed that our method has less error rate: 2.03 FAR, 0.04 FRR, and 1.04 ERR, comparing to the related work. These promising results would be used to develop a mobile application that allows implicit authentication of legitimate owners while avoiding the traditional authentication problems and using fewer smartphone resources.http://www.sciencedirect.com/science/article/pii/S1110016820303902Implicit authenticationSmartphone authenticationFeature selectionClassificationMachine learningRandom forest
collection DOAJ
language English
format Article
sources DOAJ
author Mohamed W. Abo El-Soud
Tarek Gaber
Fayez AlFayez
Mohamed Meselhy Eltoukhy
spellingShingle Mohamed W. Abo El-Soud
Tarek Gaber
Fayez AlFayez
Mohamed Meselhy Eltoukhy
Implicit authentication method for smartphone users based on rank aggregation and random forest
Alexandria Engineering Journal
Implicit authentication
Smartphone authentication
Feature selection
Classification
Machine learning
Random forest
author_facet Mohamed W. Abo El-Soud
Tarek Gaber
Fayez AlFayez
Mohamed Meselhy Eltoukhy
author_sort Mohamed W. Abo El-Soud
title Implicit authentication method for smartphone users based on rank aggregation and random forest
title_short Implicit authentication method for smartphone users based on rank aggregation and random forest
title_full Implicit authentication method for smartphone users based on rank aggregation and random forest
title_fullStr Implicit authentication method for smartphone users based on rank aggregation and random forest
title_full_unstemmed Implicit authentication method for smartphone users based on rank aggregation and random forest
title_sort implicit authentication method for smartphone users based on rank aggregation and random forest
publisher Elsevier
series Alexandria Engineering Journal
issn 1110-0168
publishDate 2021-02-01
description Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’ users run various essential applications (such as banking and e-health Apps), which contains very confidential information (e.g., credit card number and its PIN). Typically, the smartphone’s user authentication is achieved using mechanisms (password or security pattern) to verify the user identity. Although these mechanisms are cheap, simple, and quick enough for frequent logins, they are vulnerable to attacks such as shoulder surfing or smudge attack. This problem could be addressed by authenticating the users using their behaviour (i.e., touch behaviour) while using their smartphones. Such behaviours include finger’s pressure, size, and pressure time while tapping keys. Selecting features (from these behaviours) could play an important role in the authentication process’s performance. This paper aims to propose an efficient authentication method providing an implicit authentication for smartphone users while not imposing an additional cost of special hardware and addressing the limited smartphone capabilities. We first investigated feature selection techniques from the filter and wrapper approaches and then used the best one to propose our implicit authentication method. The random forest classifier is used to evaluate these techniques. It is also used to achieve the classification task in our authentication method. Using a public dataset, the experimental results showed that the filter-based technique (i.e., rank aggregation) is the best feature selection to build an implicit authentication method for the smartphone environment. It showed accuracy results around 97.80% using only 25 features out of 53 features (i.e., require less mobile resources (memory and processing power) to authenticate users. At the same time, the results showed that our method has less error rate: 2.03 FAR, 0.04 FRR, and 1.04 ERR, comparing to the related work. These promising results would be used to develop a mobile application that allows implicit authentication of legitimate owners while avoiding the traditional authentication problems and using fewer smartphone resources.
topic Implicit authentication
Smartphone authentication
Feature selection
Classification
Machine learning
Random forest
url http://www.sciencedirect.com/science/article/pii/S1110016820303902
work_keys_str_mv AT mohamedwaboelsoud implicitauthenticationmethodforsmartphoneusersbasedonrankaggregationandrandomforest
AT tarekgaber implicitauthenticationmethodforsmartphoneusersbasedonrankaggregationandrandomforest
AT fayezalfayez implicitauthenticationmethodforsmartphoneusersbasedonrankaggregationandrandomforest
AT mohamedmeselhyeltoukhy implicitauthenticationmethodforsmartphoneusersbasedonrankaggregationandrandomforest
_version_ 1721401254396035072