skip to main content
research-article

SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search

Published:10 July 2023Publication History
Skip Abstract Section

Abstract

Mobile devices have been playing significant roles in our daily lives, which has made device security and privacy protection extremely important. These mobile devices storing user sensitive and private information, therefore, need rigorous user authentication mechanisms. In this article, we present SearchAuth, a novel continuous authentication system on smartphones exploiting a neural architecture search (NAS) to find an optimal network architecture and an auto augmentation search (AAS) to more effectively train the optimal network along with the best data augmentation policies, by leveraging the accelerometer, gyroscope, and magnetometer on smartphones to capture users’ behavioral patterns. Specifically, SearchAuth consists of three stages, i.e., the offline stage, registration stage, and authentication stage. In the offline stage, we utilize the NAS on sensor data of the accelerometer, gyroscope, and magnetometer to find an optimal network architecture based on the designed search space. With the optimal network architecture, namely, NAS-based model, the AAS automatically optimizes the augmentation of the input data for more effectively training the model that is for feature extraction. In the registration stage, we use the trained NAS-based model to learn and extract deep features from the legitimate user’s data, and train the LOF classifier with 55 features selected by the PCA. In the authentication stage, with the well-trained NAS-based model and LOF classifier, SearchAuth identifies the current user as a legitimate user or an impostor when the user starts operating a smartphone. Based on our dataset, we evaluate the performance of the proposed SearchAuth, and the experimental results demonstrate that SearchAuth surpasses the representative authentication schemes by achieving the best accuracy of 93.95%, F1-score of 94.30%, and EER of 5.30% on the LOF classifier with dataset size of 100.

REFERENCES

  1. [1] Al-Hadithy Nawfal, Gikas Panagiotis D., and Al-Nammari Shafic Said. 2012. Smartphones in orthopaedics. International Orthopaedics 36, 8 (2012), 15431547.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Wang Ding, Gu Qianchen, Huang Xinyi, and Wang Ping. 2017. Understanding human-chosen pins: Characteristics, distribution and security. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS’17). 372385.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Bonneau Joseph, Herley Cormac, Oorschot Paul C. van, and Stajano Frank. 2015. Passwords and the evolution of imperfect authentication. Communications of the ACM 58, 7(2015), 7887.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Wang Ding, Zhang Zijian, Wang Ping, Yan Jeff, and Huang Xinyi. 2016. Targeted online password guessing: An underestimated threat. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 12421254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Quan Feng, Fei Su, Anni Cai, and Feifei Zhao. 2008. Cracking cancelable fingerprint template of ratha. In Proceedings of the 2008 International Symposium on Computer Science and Computational Technology (ISCSCT’08). 572575.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Frank Mario, Biedert Ralf, Ma Eugene, Martinovic Ivan, and Song Dawn. 2012. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2012), 136148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Feng Huan, Fawaz Kassem, and Shin Kang G.. 2017. Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom’17). 343355.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Abeni Paolo, Baltatu Madalina, and D’Alessandro Rosalia. 2006. Nis03-4: Implementing biometrics-based authentication for mobile devices. In Proceedings of the IEEE Globecom 2006. 15.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Xu Hui, Zhou Yangfan, and Lyu Michael R.. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS’14). 187198.Google ScholarGoogle Scholar
  10. [10] Gascon Hugo, Uellenbeck Sebastian, Wolf Christopher, and Rieck Konrad. 2014. Continuous authentication on mobile devices by analysis of typing motion behavior. In Proceedings of the Sicherheit 2014. 112.Google ScholarGoogle Scholar
  11. [11] Muaaz Muhammad and Mayrhofer René. 2013. An analysis of different approaches to gait recognition using cell phone based accelerometers. In Proceedings of the International Conference on Advances in Mobile Computing and Multimedia (MoMM’13). 293300.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Centeno Mario Parreño, Moorsel Aad van, and Castruccio Stefano. 2017. Smartphone continuous authentication using deep learning autoencoders. In Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST’17). 1471478.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Li Yantao, Tao Peng, Deng Shaojiang, and Zhou Gang. 2021. DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Transactions on Sensor Networks 18, 2, (2021), 20 pages. Google ScholarGoogle Scholar
  14. [14] Um Terry T., Pfister Franz MJ, Pichler Daniel, Endo Satoshi, Lang Muriel, Hirche Sandra, Fietzek Urban, and Kulić Dana. 2017. Data augmentation of wearable sensor data for parkinson’s disease monitoring using convolutional neural networks. In Proceedings of the 19th ACM International Conference on Multimodal Interaction. 216220.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Li Yantao, Hu Hailong, and Zhou Gang. 2018. Using data augmentation in continuous authentication on smartphones. IEEE Internet of Things Journal 6, 1 (2018), 628640.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Xinyue Zhu, Yifan Liu, Jiahong Li, Tao Wan, and Zengchang Qin. 2018. Emotion classification with data augmentation using generative adversarial networks. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’18). 349–360.Google ScholarGoogle Scholar
  17. [17] Luo Yun and Lu Bao-Liang. 2018. EEG data augmentation for emotion recognition using a conditional wasserstein GAN. In Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’18). 25352538.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Deng Shaojiang, Luo Jiaxing, and Li Yantao. 2021. CNN-based continuous authentication on smartphones with auto augmentation search. In Proceedings of the International Conference on Information and Communications Security (ICICS’21). 169186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Mahbub Upal, Patel Vishal M., Chandra Deepak, Barbello Brandon, and Chellappa Rama. 2016. Partial face detection for continuous authentication. In Proceedings of the IEEE International Conference on Image Processing (ICIP’16). 29912995.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Lu Chris Xiaoxuan, Du Bowen, Zhao Peijun, Wen Hongkai, Shen Yiran, Markham Andrew, and Trigoni Niki. 2018. Deepauth: In-situ authentication for smartwatches via deeply learned behavioural biometrics. In Proceedings of the 2018 ACM International Symposium on Wearable Computers (ISWC’18). 204207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Maiorana Emanuele, Kalita Himanka, and Campisi Patrizio. 2019. Deepkey: Keystroke dynamics and cnn for biometric recognition on mobile devices. In Proceedings of the 8th European Workshop on Visual Information Processing (EUVIP’19). 181186.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Abuhamad Mohammed, Abuhmed Tamer, Mohaisen David, and Nyang DaeHun. 2020. AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet of Things Journal 7, 6 (2020), 50085020.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Li Yantao, Hu Hailong, Zhu Zhangqian, and Zhou Gang. 2020. SCANet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Transactions on Sensor Networks 16, 3(2020), 27 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Li Yantao, Hu Hailong, Zhou Gang, and Deng Shaojiang. 2018. Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6 (2018), 3255432565. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Tschuchnig Maximilian Ernst, Ferner Cornelia, and Wegenkittl Stefan. 2020. Sequential IoT data augmentation using generative adversarial networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’20). 42124216.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Li Xiang, Zhang Wei, Ding Qian, and Sun Jian-Qiao. 2020. Intelligent rotating machinery fault diagnosis based on deep learning using data augmentation. Journal of Intelligent Manufacturing 31, 2 (2020), 433452.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Li Yantao, Luo Jiaxing, Deng Shaojiang, and Zhou Gang. 2022. CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network. IEEE Internet of Things Journal 9, 7 (2022), 54475460. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Qin Huafeng, El-Yacoubi Mounim A., Li Yantao, and Liu Chongwen. 2021. Multi-scale and multi-direction gan for CNN-based single palm-vein identification. IEEE Transactions on Information Forensics and Security 16 (2021), 26522666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Li Yantao, Liu Li, Qin Huafeng, Deng Shaojiang, El-Yacoubi Mounim A., and Zhou Gang. 2022. Adaptive deep feature fusion for continuous authentication with data augmentation. IEEE Transactions on Mobile Computing (2022), 116. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Yang Qing, Peng Ge, Nguyen David T., Qi Xin, Zhou Gang, Sitová Zdeňka, Gasti Paolo, and Balagani Kiran S.. 2014. A multimodal data set for evaluating continuous authentication performance in smartphones. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems (SenSys’14). 358359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Real Esteban, Aggarwal Alok, Huang Yanping, and Le Quoc V.. 2019. Regularized evolution for image classifier architecture search. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI’19). 47804789.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Zoph Barret, Vasudevan Vijay, Shlens Jonathon, and Le Quoc V.. 2018. Learning transferable architectures for scalable image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 86978710.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Zoph Barret and Le Quoc V.. 2017. Neural architecture search with reinforcement learning. In Proceedings of the 5th International Conference on Learning Representations (ICLR’17) (2017), 116.Google ScholarGoogle Scholar
  34. [34] Schulman John, Wolski Filip, Dhariwal Prafulla, Radford Alec, and Klimov Oleg. 2017. Proximal policy optimization algorithms. arXiv:1707.06347. Retrieved from https://arxiv.org/abs/1707.06347.Google ScholarGoogle Scholar
  35. [35] Pham Hieu, Guan Melody, Zoph Barret, Le Quoc, and Dean Jeff. 2018. Efficient neural architecture search via parameters sharing. In Proceedings of the 35th International Conference on Machine Learning (PMLR’18). 40954104.Google ScholarGoogle Scholar
  36. [36] Howard Andrew, Mark Sandler, Grace Chu, Liang-Chieh Chen, Bo Chen, Mingxing Tan, Weijun Wang, Yukun Zhu, Ruoming Pang, Vijay Vasudevan, Quoc V. Le, and Hartwig Adam. 2019. Searching for mobilenetv3. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV’19). 13141324.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Hu Jie, Shen Li, and Sun Gang. 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 71327141.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Sandler Mark, Howard Andrew, Zhu Menglong, Zhmoginov Andrey, and Chen Liang-Chieh. 2018. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 45104520.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Cubuk Ekin D., Zoph Barret, Mane Dandelion, Vasudevan Vijay, and Le Quoc V.. 2019. Autoaugment: Learning augmentation strategies from data. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR’19). 113123.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Gonzalez-Manzano Lorena, Mahbub Upal, Fuentes Jose M. de, and Chellappa Rama. 2020. Impact of injection attacks on sensor-based continuous authentication for smartphones. Computer Communications 163 (2020), 150161.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Lin Chen, Guo Minghao, Li Chuming, Yuan Xin, Wu Wei, Yan Junjie, Lin Dahua, and Ouyang Wanli. 2019. Online hyper-parameter learning for auto-augmentation strategy. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV’19). 65796588.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Breunig Markus M., Kriegel Hans-Peter, Ng Raymond T., and Sander Jörg. 2000. LOF: Identifying density-based local outliers. SIGMOD Record 29, 2 (2000), 93104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Wu Cong, He Kun, Chen Jing, Zhao Ziming, and Du Ruiying. 2020. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 22192236.Google ScholarGoogle Scholar
  44. [44] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770778.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Ma Ningning, Zhang Xiangyu, Zheng Hai-Tao, and Sun Jian. 2018. Shufflenet v2: Practical guidelines for efficient cnn architecture design. In Proceedings of the European Conference on Computer Vision (ECCV’18). 116131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Zhou Bing, Lohokare Jay, Gao Ruipeng, and Ye Fan. 2018. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom’18). 321336.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Sitová Zdeňka, Šeděnka Jaroslav, Yang Qing, Peng Ge, Zhou Gang, Gasti Paolo, and Balagani Kiran S.. 2015. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security 11, 5 (2015), 877892.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Luo Yun, Zhu Li-Zhen, Wan Zi-Yu, and Lu Bao-Liang. 2020. Data augmentation for enhancing EEG-based emotion recognition with deep generative models. Journal of Neural Engineering 17, 5 (2020), 056021.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Roy Aditi, Halevi Tzipora, and Memon Nasir. 2015. An HMM-based multi-sensor approach for continuous mobile authentication. In Proceedings of the IEEE Military Communications Conference (MILCOM’15). 13111316.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Shen Chao, Li Yuanxun, Chen Yufei, Guan Xiaohong, and Maxion Roy A.. 2017. Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Transactions on Information Forensics and Security 13, 1 (2017), 4862.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Sensor Networks
          ACM Transactions on Sensor Networks  Volume 19, Issue 4
          November 2023
          622 pages
          ISSN:1550-4859
          EISSN:1550-4867
          DOI:10.1145/3593034
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 July 2023
          • Online AM: 24 May 2023
          • Accepted: 20 May 2023
          • Revised: 12 December 2022
          • Received: 29 December 2021
          Published in tosn Volume 19, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format