Fuzzy logic-based implicit authentication for mobile access control


Autoria(s): Yao, Feng; Yerima, Suleiman Y.; Kang, BooJoong; Sezer, Sakir
Data(s)

01/09/2016

Resumo

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.

Formato

application/pdf

Identificador

http://pure.qub.ac.uk/portal/en/publications/fuzzy-logicbased-implicit-authentication-for-mobile-access-control(596fb6e7-52e6-491f-b037-f25027d7d94b).html

http://dx.doi.org/ 10.1109/SAI.2016.7556097

http://pure.qub.ac.uk/ws/files/93999536/FL_based_imp_auth_for_Mobile_Access_Control_2016.pdf

Idioma(s)

eng

Publicador

IEEE

Direitos

info:eu-repo/semantics/openAccess

Fonte

Yao , F , Yerima , S Y , Kang , B & Sezer , S 2016 , Fuzzy logic-based implicit authentication for mobile access control . in SAI Computing Conference (SAI) 2016 . IEEE , 2016 SAI Computing Conference (SAI) , London , United Kingdom , 13-15 July . DOI: 10.1109/SAI.2016.7556097

Palavras-Chave #Authentication #fuzzy logic #fuzzy systems #access control #Android #behavior based authentication #implicit authentication
Tipo

contributionToPeriodical