SlideShare a Scribd company logo
1 of 4
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES
WITH HABITUAL SINGLE-HANDEDSHAKES
ABSTRACT
Smartphones have been widely used with a vast array of sensitive and private information stored
on these devices. Tosecure such information from being leaked, user authentication schemes are
necessary. Current password/pattern-based userauthentication schemes are vulnerable to
shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes aresecure but
inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication
scheme for secure unlockingof a smartphone by simply shaking the phone. With embedded
motion sensors, ShakeIn can effectively capture the unique and reliablebiometrical features of
users about how they shake. In this way, even if an attacker sees a user shaking his/her phone,
the attacker canhardly reproduce the same behaviour. Furthermore, by allowing users to
customise the way how they shake the phone, ShakeInendows users with the maximum operation
flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations andreal
experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple
months. The results show that ShakeInachieves an average equal error rate of 1:2% with a small
number of shakes using only 35 training samples even in the presence ofshoulder-surfing attacks.
PROPOSED SYSTEM:
we propose a smartphone user authenticationscheme, called ShakeIn, based on customised
single-handed shakes. As shown in Figure 1(a), a shake refers to ato-and-fro movement with one
hand holding a smartphoneand swinging the x- and y-axis coordinate plane of thephone around
the elbow in the air. In essence, ShakeInadopts a machine learning methodology, consisting of
atraining phase and an authentication phase. More specifically,in the training phase, ShakeIn first
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
asks a legitimateuser to choose his/her preferred shaking styles and collectsa small number of
shakes. For each of such shakes, uniqueand reliable biometrical features are derived from the
rawreadings of the embedded 3D accelerometer and the gyroscopesensors, and then utilised to
establish a SupportingVector Machines (SVM) classifier. In the authenticationphase, ShakeIn use
the pre-trained classifier to verify thelegitimacy of shaking attempts from a user and unlock
thephone if the user passes the verification. The key insightbehind ShakeIn is that people have
consistent and distinguishingphysiological characteristics (e.g., the physicalstructure of the arm)
and behavioural characteristics (e.g.,shaking behaviour patterns) while doing shakes
EXISTIONG SYSTEM:
Several schemes have been proposed that utilise theaccelerometer in smartphones to recognise
human biometricgait. In general, these schemes have low true positive ratesas it is sensitive to
many uncontrollable factors such as thephone placement and the types of the ground surface
andshoes. Other physiological characteristics such as fingerprints, face and sound could be
utilised for authentication.Typing behaviour with physical keyboards can be utilisedto
authenticate users but the performance of theseschemes when applied to smartphones is
uncertain as typingbehaviour on touch screens is more difficult to model.Some schemes have
been proposed to draw specialgestures on the touch screen of a smartphone for
authentication.OpenSesame and uWave are the two schemesmostly related to our work.
OpenSesame allows users toshake or roll their phones with no special requirementsand derives
four types of geometric features with threeaxisraw acceleration readings. Probability density
functions(PDFs) of those feature samples are further used to trainclassifiers and verify a user.
UWave can verify the legitimacyof a user by comparing the time series of three-axisacceleration
readings of a testing gesture drawn in the airto a pre-defined template library by employing
dynamictime warping (DTW). These schemes have relatively highfalse positive errors especially
under shoulder-surfing attacks.ShakeIn differs from both schemes essentially in howfeatures are
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
extracted. In ShakeIn, both physiological andbehavioural characteristics are considered, which
makesShakeIn easy to use and at the same time resilient toshoulder-surfing attacks
CONCLUSION
In this paper, we have proposed a smartphone user authenticationscheme, called ShakeIn, based
on customised onehandshakes. ShakeIn is resilient to shoulder-surfing andbiometrics hacking
attacks as it adopts both physiologicaland behavioural characteristics to profile users.
Furthermore,ShakeIn is handy as it allows customised shakes andsingle-hand operations.
ShakeIn is quite reliable and canwork well with different modes of transport. As ShakeInneeds
only off-the-shelf devices, it is easy to gain a widedeployment. Nevertheless, ShakeIn also has
several limitations.For example, if a user forgets how he/she shakesduring the training phase, it
is very likely for ShakeInto refuse this user for unlocking. We suggest that a userchooses the
most comfortable shaking styles as his/her“passwords”. Another limitation of ShakeIn is that
currentlyit can work with two common people postures, i.e., sittingand standing. It would be
more practical if more posturesare supported. In addition, extending ShakeIn to other
mobiledevices bigger than smartphones in size such as tabletsis also challenging. Moreover, we
would also investigate touse more advanced classifiers such as Structural MinimaxProbability
Machine in the future.
REFERENCES
[1] European Union Agency for Network and InformationSecurity, “Top Ten Smartphone
Risks,”https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical-
applications/smartphone-security-1/top-ten-risks.
[2] F. Tari, A. Ozok, and S. H. Holden, “A Comparison of Perceivedand Real Shoulder-surfing
Risks between Alphanumeric andGraphical Passwords,” in Proceedings of the second ACM
Symposiumon Usable privacy and security, 2006, pp. 56–66.
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
[3] F. Schaub, R. Deyhle, and M. Weber, “Password Entry Usabilityand Shoulder Surfing
Susceptibility on Different Smartphone Platforms,”in Proceedings of the 11th ACM International
Conference onMobile and Ubiquitous Multimedia, 2012.[4] A. J. Aviv, K. Gibson, E. Mossop,
M. Blaze, and J. M. Smith,“Smudge Attacks on Smartphone Touch Screens,” WOOT, vol.
10,pp. 1–7, 2010.
[5] The Apple Inc., “About Touch ID Security on iPhone and iPad,”https://support.apple.com/en-
us/HT204587.
[6] M. Shahzad, A. X. Liu, and A. Samuel, “Secure Unlocking ofMobile Touch Screen Devices
by Simple Gestures: You can seeit but you can not do it,” in Proceedings of ACM MobiCom,
2013.
[7] J. R. Kwapisz, G. M. Weiss, S. Moore et al., “Cell Phone-basedBiometric Identification,” in
Proceedings of IEEE Biometrics Compendium,2010.[8] D. Gafurov, K. Helkala, and T. Søndrol,
“Biometric Gait AuthenticationUsing Accelerometer Sensor,” Journal of Computers, vol. 1,no. 7,
pp. 51–59, 2006.
[9] C. Yuan, X. Sun, and R. Lv, “Fingerprint Liveness Detection Basedon Multi-Scale LPQ and
PCA,” China Communications, vol. 13,no. 7, pp. 60–65, 2016.
[10] F. Monrose, M. K. Reiter, and S. Wetzel, “Password HardeningBased on Keystroke
Dynamics,” International Journal of InformationSecurity, vol. 1, no. 2, pp. 69–83, 2002.
[11] S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, “KeystrokebasedUser Identification
on Smart Phones,” in Proceedings ofthe 12th International Symposium on Recent Advances in
IntrusionDetection. Springer, 2009.
[12] A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann,“Touch Me Once and I
Know It’s You!: Implicit AuthenticationBased on Touch Screen Patterns,” in Proceedings of
ACM SIGCHI,2012.

More Related Content

What's hot

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...JPINFOTECH JAYAPRAKASH
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 

What's hot (7)

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
MobileIron Threat Defense
MobileIron Threat DefenseMobileIron Threat Defense
MobileIron Threat Defense
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
I018145157
I018145157I018145157
I018145157
 

Similar to SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMNexgen Technology
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...csandit
 
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...cscpconf
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesUvaraj Shan
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...IRJET Journal
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centerVenkat Projects
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 

Similar to SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES (20)

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
 
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Dm36678681
Dm36678681Dm36678681
Dm36678681
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 

Recently uploaded

The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff17thcssbs2
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptxmanishaJyala2
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 

Recently uploaded (20)

The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptxREPRODUCTIVE TOXICITY  STUDIE OF MALE AND FEMALEpptx
REPRODUCTIVE TOXICITY STUDIE OF MALE AND FEMALEpptx
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 

SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES

  • 1. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES ABSTRACT Smartphones have been widely used with a vast array of sensitive and private information stored on these devices. Tosecure such information from being leaked, user authentication schemes are necessary. Current password/pattern-based userauthentication schemes are vulnerable to shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes aresecure but inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication scheme for secure unlockingof a smartphone by simply shaking the phone. With embedded motion sensors, ShakeIn can effectively capture the unique and reliablebiometrical features of users about how they shake. In this way, even if an attacker sees a user shaking his/her phone, the attacker canhardly reproduce the same behaviour. Furthermore, by allowing users to customise the way how they shake the phone, ShakeInendows users with the maximum operation flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations andreal experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple months. The results show that ShakeInachieves an average equal error rate of 1:2% with a small number of shakes using only 35 training samples even in the presence ofshoulder-surfing attacks. PROPOSED SYSTEM: we propose a smartphone user authenticationscheme, called ShakeIn, based on customised single-handed shakes. As shown in Figure 1(a), a shake refers to ato-and-fro movement with one hand holding a smartphoneand swinging the x- and y-axis coordinate plane of thephone around the elbow in the air. In essence, ShakeInadopts a machine learning methodology, consisting of atraining phase and an authentication phase. More specifically,in the training phase, ShakeIn first
  • 2. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, asks a legitimateuser to choose his/her preferred shaking styles and collectsa small number of shakes. For each of such shakes, uniqueand reliable biometrical features are derived from the rawreadings of the embedded 3D accelerometer and the gyroscopesensors, and then utilised to establish a SupportingVector Machines (SVM) classifier. In the authenticationphase, ShakeIn use the pre-trained classifier to verify thelegitimacy of shaking attempts from a user and unlock thephone if the user passes the verification. The key insightbehind ShakeIn is that people have consistent and distinguishingphysiological characteristics (e.g., the physicalstructure of the arm) and behavioural characteristics (e.g.,shaking behaviour patterns) while doing shakes EXISTIONG SYSTEM: Several schemes have been proposed that utilise theaccelerometer in smartphones to recognise human biometricgait. In general, these schemes have low true positive ratesas it is sensitive to many uncontrollable factors such as thephone placement and the types of the ground surface andshoes. Other physiological characteristics such as fingerprints, face and sound could be utilised for authentication.Typing behaviour with physical keyboards can be utilisedto authenticate users but the performance of theseschemes when applied to smartphones is uncertain as typingbehaviour on touch screens is more difficult to model.Some schemes have been proposed to draw specialgestures on the touch screen of a smartphone for authentication.OpenSesame and uWave are the two schemesmostly related to our work. OpenSesame allows users toshake or roll their phones with no special requirementsand derives four types of geometric features with threeaxisraw acceleration readings. Probability density functions(PDFs) of those feature samples are further used to trainclassifiers and verify a user. UWave can verify the legitimacyof a user by comparing the time series of three-axisacceleration readings of a testing gesture drawn in the airto a pre-defined template library by employing dynamictime warping (DTW). These schemes have relatively highfalse positive errors especially under shoulder-surfing attacks.ShakeIn differs from both schemes essentially in howfeatures are
  • 3. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, extracted. In ShakeIn, both physiological andbehavioural characteristics are considered, which makesShakeIn easy to use and at the same time resilient toshoulder-surfing attacks CONCLUSION In this paper, we have proposed a smartphone user authenticationscheme, called ShakeIn, based on customised onehandshakes. ShakeIn is resilient to shoulder-surfing andbiometrics hacking attacks as it adopts both physiologicaland behavioural characteristics to profile users. Furthermore,ShakeIn is handy as it allows customised shakes andsingle-hand operations. ShakeIn is quite reliable and canwork well with different modes of transport. As ShakeInneeds only off-the-shelf devices, it is easy to gain a widedeployment. Nevertheless, ShakeIn also has several limitations.For example, if a user forgets how he/she shakesduring the training phase, it is very likely for ShakeInto refuse this user for unlocking. We suggest that a userchooses the most comfortable shaking styles as his/her“passwords”. Another limitation of ShakeIn is that currentlyit can work with two common people postures, i.e., sittingand standing. It would be more practical if more posturesare supported. In addition, extending ShakeIn to other mobiledevices bigger than smartphones in size such as tabletsis also challenging. Moreover, we would also investigate touse more advanced classifiers such as Structural MinimaxProbability Machine in the future. REFERENCES [1] European Union Agency for Network and InformationSecurity, “Top Ten Smartphone Risks,”https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical- applications/smartphone-security-1/top-ten-risks. [2] F. Tari, A. Ozok, and S. H. Holden, “A Comparison of Perceivedand Real Shoulder-surfing Risks between Alphanumeric andGraphical Passwords,” in Proceedings of the second ACM Symposiumon Usable privacy and security, 2006, pp. 56–66.
  • 4. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, [3] F. Schaub, R. Deyhle, and M. Weber, “Password Entry Usabilityand Shoulder Surfing Susceptibility on Different Smartphone Platforms,”in Proceedings of the 11th ACM International Conference onMobile and Ubiquitous Multimedia, 2012.[4] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith,“Smudge Attacks on Smartphone Touch Screens,” WOOT, vol. 10,pp. 1–7, 2010. [5] The Apple Inc., “About Touch ID Security on iPhone and iPad,”https://support.apple.com/en- us/HT204587. [6] M. Shahzad, A. X. Liu, and A. Samuel, “Secure Unlocking ofMobile Touch Screen Devices by Simple Gestures: You can seeit but you can not do it,” in Proceedings of ACM MobiCom, 2013. [7] J. R. Kwapisz, G. M. Weiss, S. Moore et al., “Cell Phone-basedBiometric Identification,” in Proceedings of IEEE Biometrics Compendium,2010.[8] D. Gafurov, K. Helkala, and T. Søndrol, “Biometric Gait AuthenticationUsing Accelerometer Sensor,” Journal of Computers, vol. 1,no. 7, pp. 51–59, 2006. [9] C. Yuan, X. Sun, and R. Lv, “Fingerprint Liveness Detection Basedon Multi-Scale LPQ and PCA,” China Communications, vol. 13,no. 7, pp. 60–65, 2016. [10] F. Monrose, M. K. Reiter, and S. Wetzel, “Password HardeningBased on Keystroke Dynamics,” International Journal of InformationSecurity, vol. 1, no. 2, pp. 69–83, 2002. [11] S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, “KeystrokebasedUser Identification on Smart Phones,” in Proceedings ofthe 12th International Symposium on Recent Advances in IntrusionDetection. Springer, 2009. [12] A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann,“Touch Me Once and I Know It’s You!: Implicit AuthenticationBased on Touch Screen Patterns,” in Proceedings of ACM SIGCHI,2012.