Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity...Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity.These technologies are simple,inexpensive,and fast for repeated logins.However,these technologies are still subject to assaults like smudge assaults and shoulder surfing.Users’touch behavior while using their cell phones might be used to authenticate them,which would solve the problem.The performance of the authentication process may be influenced by the attributes chosen(from these behaviors).The purpose of this study is to present an effective authentication technique that implicitly offers a better authentication method for smartphone usage while avoiding the cost of a particular device and considering the constrained capabilities of smartphones.We began by concentrating on feature selection methods utilizing the grey wolf optimization strategy.The random forest classifier is used to evaluate these tactics.The testing findings demonstrated that the grey wolf-based methodology works as a better optimum feature selection for building an implicit authentication mechanism for the smartphone environment when using a public dataset.It achieved a 97.89%accuracy rate while utilizing just 16 of the 53 characteristics like utilizing minimum mobile resources mainly;processing power of the device and memory to validate individuals.Simultaneously,the findings revealed that our approach has a lower equal error rate(EER)of 0.5104,a false acceptance rate(FAR)of 1.00,and a false rejection rate(FRR)of 0.0209 compared to the methods discussed in the literature.These promising results will be used to create a mobile application that enables implicit validation of authorized users yet avoids current identification concerns and requires fewer mobile resources.展开更多
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuou...The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods.展开更多
User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in...User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile phones.Textual passwords are slightly unprotected and are easily attackable.The attacks include dictionary,shoulder surfing,and brute force.Graphical passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of use.This paper proposes a Process-based Pattern Authentication(PPA)system for Internet of Things(IoT)devices that does not require a server to maintain a static password of the login user.The server stores user’s information,which they provide at the time of registration,i.e.,the R-code and the symbol,but the P-code,i.e.,the actual password,will change with every login attempt of users.In this scheme,users may draw a pattern on the basis of calculation from the P-code and Rcode in the PPA pattern,and can authenticate themselves using their touch dynamic behaviors through Artificial Neural Network(ANN).The ANN is trained on touch behaviors of legitimate users reporting superior performance over the existing methods.For experimental purposes,PPA is implemented as a prototype on a computer system to carry out experiments for the evaluation in terms of memorability and usability.The experiments show that the system has an effect of 5.03%of the False Rejection Rate(FRR)and 4.36%of the False Acceptance Rate(FAR),respectively.展开更多
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e...An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.展开更多
基金This work was funded by the University of Jeddah,Jeddah,Saudi Arabia,under grant No.(UJ-21-DR-25)The authors,therefore,acknowledge with thanks the University of Jeddah technical and financial support.
文摘Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity.These technologies are simple,inexpensive,and fast for repeated logins.However,these technologies are still subject to assaults like smudge assaults and shoulder surfing.Users’touch behavior while using their cell phones might be used to authenticate them,which would solve the problem.The performance of the authentication process may be influenced by the attributes chosen(from these behaviors).The purpose of this study is to present an effective authentication technique that implicitly offers a better authentication method for smartphone usage while avoiding the cost of a particular device and considering the constrained capabilities of smartphones.We began by concentrating on feature selection methods utilizing the grey wolf optimization strategy.The random forest classifier is used to evaluate these tactics.The testing findings demonstrated that the grey wolf-based methodology works as a better optimum feature selection for building an implicit authentication mechanism for the smartphone environment when using a public dataset.It achieved a 97.89%accuracy rate while utilizing just 16 of the 53 characteristics like utilizing minimum mobile resources mainly;processing power of the device and memory to validate individuals.Simultaneously,the findings revealed that our approach has a lower equal error rate(EER)of 0.5104,a false acceptance rate(FAR)of 1.00,and a false rejection rate(FRR)of 0.0209 compared to the methods discussed in the literature.These promising results will be used to create a mobile application that enables implicit validation of authorized users yet avoids current identification concerns and requires fewer mobile resources.
文摘The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods.
基金This work was supported by the Deanship of Scientific Research at King Saud University,Riyadh,Saudi Arabia,through the Vice Deanship of Scientific Research Chairs:Chair of Cyber Security.
文摘User authentication is one of the critical concerns of information security.Users tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile phones.Textual passwords are slightly unprotected and are easily attackable.The attacks include dictionary,shoulder surfing,and brute force.Graphical passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of use.This paper proposes a Process-based Pattern Authentication(PPA)system for Internet of Things(IoT)devices that does not require a server to maintain a static password of the login user.The server stores user’s information,which they provide at the time of registration,i.e.,the R-code and the symbol,but the P-code,i.e.,the actual password,will change with every login attempt of users.In this scheme,users may draw a pattern on the basis of calculation from the P-code and Rcode in the PPA pattern,and can authenticate themselves using their touch dynamic behaviors through Artificial Neural Network(ANN).The ANN is trained on touch behaviors of legitimate users reporting superior performance over the existing methods.For experimental purposes,PPA is implemented as a prototype on a computer system to carry out experiments for the evaluation in terms of memorability and usability.The experiments show that the system has an effect of 5.03%of the False Rejection Rate(FRR)and 4.36%of the False Acceptance Rate(FAR),respectively.
基金Sponsored bythe National Natural Science Foundation of China(60203012)
文摘An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.