Abstract
Mobile devices have been playing significant roles in our daily lives, which has made device security and privacy protection extremely important. These mobile devices storing user sensitive and private information, therefore, need rigorous user authentication mechanisms. In this article, we present SearchAuth, a novel continuous authentication system on smartphones exploiting a neural architecture search (NAS) to find an optimal network architecture and an auto augmentation search (AAS) to more effectively train the optimal network along with the best data augmentation policies, by leveraging the accelerometer, gyroscope, and magnetometer on smartphones to capture users’ behavioral patterns. Specifically, SearchAuth consists of three stages, i.e., the offline stage, registration stage, and authentication stage. In the offline stage, we utilize the NAS on sensor data of the accelerometer, gyroscope, and magnetometer to find an optimal network architecture based on the designed search space. With the optimal network architecture, namely, NAS-based model, the AAS automatically optimizes the augmentation of the input data for more effectively training the model that is for feature extraction. In the registration stage, we use the trained NAS-based model to learn and extract deep features from the legitimate user’s data, and train the LOF classifier with 55 features selected by the PCA. In the authentication stage, with the well-trained NAS-based model and LOF classifier, SearchAuth identifies the current user as a legitimate user or an impostor when the user starts operating a smartphone. Based on our dataset, we evaluate the performance of the proposed SearchAuth, and the experimental results demonstrate that SearchAuth surpasses the representative authentication schemes by achieving the best accuracy of 93.95%, F1-score of 94.30%, and EER of 5.30% on the LOF classifier with dataset size of 100.
- [1] . 2012. Smartphones in orthopaedics. International Orthopaedics 36, 8 (2012), 1543–1547.Google ScholarCross Ref
- [2] . 2017. Understanding human-chosen pins: Characteristics, distribution and security. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS’17). 372–385.Google ScholarDigital Library
- [3] . 2015. Passwords and the evolution of imperfect authentication. Communications of the ACM 58, 7(2015), 78–87.Google ScholarDigital Library
- [4] . 2016. Targeted online password guessing: An underestimated threat. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16). 1242–1254.Google ScholarDigital Library
- [5] . 2008. Cracking cancelable fingerprint template of ratha. In Proceedings of the 2008 International Symposium on Computer Science and Computational Technology (ISCSCT’08). 572–575.Google ScholarDigital Library
- [6] . 2012. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2012), 136–148.Google ScholarDigital Library
- [7] . 2017. Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom’17). 343–355.Google ScholarDigital Library
- [8] . 2006. Nis03-4: Implementing biometrics-based authentication for mobile devices. In Proceedings of the IEEE Globecom 2006. 1–5.Google ScholarCross Ref
- [9] . 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS’14). 187–198.Google Scholar
- [10] . 2014. Continuous authentication on mobile devices by analysis of typing motion behavior. In Proceedings of the Sicherheit 2014. 1–12.Google Scholar
- [11] . 2013. An analysis of different approaches to gait recognition using cell phone based accelerometers. In Proceedings of the International Conference on Advances in Mobile Computing and Multimedia (MoMM’13). 293–300.Google ScholarDigital Library
- [12] . 2017. Smartphone continuous authentication using deep learning autoencoders. In Proceedings of the 15th Annual Conference on Privacy, Security and Trust (PST’17). 147–1478.Google ScholarCross Ref
- [13] . 2021. DeFFusion: CNN-based continuous authentication using deep feature fusion. ACM Transactions on Sensor Networks 18, 2, (2021), 20 pages. Google Scholar
- [14] . 2017. Data augmentation of wearable sensor data for parkinson’s disease monitoring using convolutional neural networks. In Proceedings of the 19th ACM International Conference on Multimodal Interaction. 216–220.Google ScholarDigital Library
- [15] . 2018. Using data augmentation in continuous authentication on smartphones. IEEE Internet of Things Journal 6, 1 (2018), 628–640.Google ScholarCross Ref
- [16] Xinyue Zhu, Yifan Liu, Jiahong Li, Tao Wan, and Zengchang Qin. 2018. Emotion classification with data augmentation using generative adversarial networks. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’18). 349–360.Google Scholar
- [17] . 2018. EEG data augmentation for emotion recognition using a conditional wasserstein GAN. In Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’18). 2535–2538.Google ScholarCross Ref
- [18] . 2021. CNN-based continuous authentication on smartphones with auto augmentation search. In Proceedings of the International Conference on Information and Communications Security (ICICS’21). 169–186.Google ScholarDigital Library
- [19] . 2016. Partial face detection for continuous authentication. In Proceedings of the IEEE International Conference on Image Processing (ICIP’16). 2991–2995.Google ScholarCross Ref
- [20] . 2018. Deepauth: In-situ authentication for smartwatches via deeply learned behavioural biometrics. In Proceedings of the 2018 ACM International Symposium on Wearable Computers (ISWC’18). 204–207.Google ScholarDigital Library
- [21] . 2019. Deepkey: Keystroke dynamics and cnn for biometric recognition on mobile devices. In Proceedings of the 8th European Workshop on Visual Information Processing (EUVIP’19). 181–186.Google ScholarCross Ref
- [22] . 2020. AUToSen: Deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet of Things Journal 7, 6 (2020), 5008–5020.Google ScholarCross Ref
- [23] . 2020. SCANet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Transactions on Sensor Networks 16, 3(2020), 27 pages. Google ScholarDigital Library
- [24] . 2018. Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6 (2018), 32554–32565.
DOI: Google ScholarCross Ref - [25] . 2020. Sequential IoT data augmentation using generative adversarial networks. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’20). 4212–4216.Google ScholarCross Ref
- [26] . 2020. Intelligent rotating machinery fault diagnosis based on deep learning using data augmentation. Journal of Intelligent Manufacturing 31, 2 (2020), 433–452.Google ScholarDigital Library
- [27] . 2022. CNN-based continuous authentication on smartphones with conditional wasserstein generative adversarial network. IEEE Internet of Things Journal 9, 7 (2022), 5447–5460.
DOI: Google ScholarCross Ref - [28] . 2021. Multi-scale and multi-direction gan for CNN-based single palm-vein identification. IEEE Transactions on Information Forensics and Security 16 (2021), 2652–2666.Google ScholarDigital Library
- [29] . 2022. Adaptive deep feature fusion for continuous authentication with data augmentation. IEEE Transactions on Mobile Computing (2022), 1–16.
DOI: Google ScholarCross Ref - [30] . 2014. A multimodal data set for evaluating continuous authentication performance in smartphones. In Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems (SenSys’14). 358–359.Google ScholarDigital Library
- [31] . 2019. Regularized evolution for image classifier architecture search. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI’19). 4780–4789.Google ScholarDigital Library
- [32] . 2018. Learning transferable architectures for scalable image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 8697–8710.Google ScholarCross Ref
- [33] . 2017. Neural architecture search with reinforcement learning. In Proceedings of the 5th International Conference on Learning Representations (ICLR’17) (2017), 1–16.Google Scholar
- [34] . 2017. Proximal policy optimization algorithms. arXiv:1707.06347. Retrieved from https://arxiv.org/abs/1707.06347.Google Scholar
- [35] . 2018. Efficient neural architecture search via parameters sharing. In Proceedings of the 35th International Conference on Machine Learning (PMLR’18). 4095–4104.Google Scholar
- [36] . 2019. Searching for mobilenetv3. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV’19). 1314–1324.Google ScholarCross Ref
- [37] . 2018. Squeeze-and-excitation networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 7132–7141.Google ScholarCross Ref
- [38] . 2018. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’18). 4510–4520.Google ScholarCross Ref
- [39] . 2019. Autoaugment: Learning augmentation strategies from data. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR’19). 113–123.Google ScholarCross Ref
- [40] . 2020. Impact of injection attacks on sensor-based continuous authentication for smartphones. Computer Communications 163 (2020), 150–161.Google ScholarCross Ref
- [41] . 2019. Online hyper-parameter learning for auto-augmentation strategy. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV’19). 6579–6588.Google ScholarCross Ref
- [42] . 2000. LOF: Identifying density-based local outliers. SIGMOD Record 29, 2 (2000), 93–104.Google ScholarDigital Library
- [43] . 2020. Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 2219–2236.Google Scholar
- [44] . 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770–778.Google ScholarCross Ref
- [45] . 2018. Shufflenet v2: Practical guidelines for efficient cnn architecture design. In Proceedings of the European Conference on Computer Vision (ECCV’18). 116–131.Google ScholarDigital Library
- [46] . 2018. EchoPrint: Two-factor authentication using acoustics and vision on smartphones. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom’18). 321–336.Google ScholarDigital Library
- [47] . 2015. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security 11, 5 (2015), 877–892.Google ScholarDigital Library
- [48] . 2020. Data augmentation for enhancing EEG-based emotion recognition with deep generative models. Journal of Neural Engineering 17, 5 (2020), 056021.Google ScholarCross Ref
- [49] . 2015. An HMM-based multi-sensor approach for continuous mobile authentication. In Proceedings of the IEEE Military Communications Conference (MILCOM’15). 1311–1316.Google ScholarDigital Library
- [50] . 2017. Performance analysis of multi-motion sensor behavior for active smartphone authentication. IEEE Transactions on Information Forensics and Security 13, 1 (2017), 48–62.Google ScholarCross Ref
Index Terms
- SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search
Recommendations
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search
Information and Communications SecurityAbstractIn this paper, we present CAuSe, a CNN-based Continuous Authentication on smartphones using Auto Augmentation Search, where the CNN is specially designed for deep feature extraction and the auto augmentation search is exploited for CNN training ...
Neural architecture search using progressive evolution
GECCO '22: Proceedings of the Genetic and Evolutionary Computation ConferenceVanilla neural architecture search using evolutionary algorithms (EA) involves evaluating each architecture by training it from scratch, which is extremely time-consuming. This can be reduced by using a supernet to estimate the fitness of every ...
2D and 3D Palmprint and Palm Vein Recognition Based on Neural Architecture Search
AbstractPalmprint recognition and palm vein recognition are two emerging biometrics technologies. In the past two decades, many traditional methods have been proposed for palmprint recognition and palm vein recognition and have achieved impressive ...
Comments