SlideShare a Scribd company logo
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES
WITH HABITUAL SINGLE-HANDEDSHAKES
ABSTRACT
Smartphones have been widely used with a vast array of sensitive and private information stored
on these devices. Tosecure such information from being leaked, user authentication schemes are
necessary. Current password/pattern-based userauthentication schemes are vulnerable to
shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes aresecure but
inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication
scheme for secure unlockingof a smartphone by simply shaking the phone. With embedded
motion sensors, ShakeIn can effectively capture the unique and reliablebiometrical features of
users about how they shake. In this way, even if an attacker sees a user shaking his/her phone,
the attacker canhardly reproduce the same behaviour. Furthermore, by allowing users to
customise the way how they shake the phone, ShakeInendows users with the maximum operation
flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations andreal
experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple
months. The results show that ShakeInachieves an average equal error rate of 1:2% with a small
number of shakes using only 35 training samples even in the presence ofshoulder-surfing attacks.
PROPOSED SYSTEM:
we propose a smartphone user authenticationscheme, called ShakeIn, based on customised
single-handed shakes. As shown in Figure 1(a), a shake refers to ato-and-fro movement with one
hand holding a smartphoneand swinging the x- and y-axis coordinate plane of thephone around
the elbow in the air. In essence, ShakeInadopts a machine learning methodology, consisting of
atraining phase and an authentication phase. More specifically,in the training phase, ShakeIn first
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
asks a legitimateuser to choose his/her preferred shaking styles and collectsa small number of
shakes. For each of such shakes, uniqueand reliable biometrical features are derived from the
rawreadings of the embedded 3D accelerometer and the gyroscopesensors, and then utilised to
establish a SupportingVector Machines (SVM) classifier. In the authenticationphase, ShakeIn use
the pre-trained classifier to verify thelegitimacy of shaking attempts from a user and unlock
thephone if the user passes the verification. The key insightbehind ShakeIn is that people have
consistent and distinguishingphysiological characteristics (e.g., the physicalstructure of the arm)
and behavioural characteristics (e.g.,shaking behaviour patterns) while doing shakes
EXISTIONG SYSTEM:
Several schemes have been proposed that utilise theaccelerometer in smartphones to recognise
human biometricgait. In general, these schemes have low true positive ratesas it is sensitive to
many uncontrollable factors such as thephone placement and the types of the ground surface
andshoes. Other physiological characteristics such as fingerprints, face and sound could be
utilised for authentication.Typing behaviour with physical keyboards can be utilisedto
authenticate users but the performance of theseschemes when applied to smartphones is
uncertain as typingbehaviour on touch screens is more difficult to model.Some schemes have
been proposed to draw specialgestures on the touch screen of a smartphone for
authentication.OpenSesame and uWave are the two schemesmostly related to our work.
OpenSesame allows users toshake or roll their phones with no special requirementsand derives
four types of geometric features with threeaxisraw acceleration readings. Probability density
functions(PDFs) of those feature samples are further used to trainclassifiers and verify a user.
UWave can verify the legitimacyof a user by comparing the time series of three-axisacceleration
readings of a testing gesture drawn in the airto a pre-defined template library by employing
dynamictime warping (DTW). These schemes have relatively highfalse positive errors especially
under shoulder-surfing attacks.ShakeIn differs from both schemes essentially in howfeatures are
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
extracted. In ShakeIn, both physiological andbehavioural characteristics are considered, which
makesShakeIn easy to use and at the same time resilient toshoulder-surfing attacks
CONCLUSION
In this paper, we have proposed a smartphone user authenticationscheme, called ShakeIn, based
on customised onehandshakes. ShakeIn is resilient to shoulder-surfing andbiometrics hacking
attacks as it adopts both physiologicaland behavioural characteristics to profile users.
Furthermore,ShakeIn is handy as it allows customised shakes andsingle-hand operations.
ShakeIn is quite reliable and canwork well with different modes of transport. As ShakeInneeds
only off-the-shelf devices, it is easy to gain a widedeployment. Nevertheless, ShakeIn also has
several limitations.For example, if a user forgets how he/she shakesduring the training phase, it
is very likely for ShakeInto refuse this user for unlocking. We suggest that a userchooses the
most comfortable shaking styles as his/her“passwords”. Another limitation of ShakeIn is that
currentlyit can work with two common people postures, i.e., sittingand standing. It would be
more practical if more posturesare supported. In addition, extending ShakeIn to other
mobiledevices bigger than smartphones in size such as tabletsis also challenging. Moreover, we
would also investigate touse more advanced classifiers such as Structural MinimaxProbability
Machine in the future.
REFERENCES
[1] European Union Agency for Network and InformationSecurity, “Top Ten Smartphone
Risks,”https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical-
applications/smartphone-security-1/top-ten-risks.
[2] F. Tari, A. Ozok, and S. H. Holden, “A Comparison of Perceivedand Real Shoulder-surfing
Risks between Alphanumeric andGraphical Passwords,” in Proceedings of the second ACM
Symposiumon Usable privacy and security, 2006, pp. 56–66.
CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249)
MAIL ID: , praveen@nexgenproject.com
Web: www.nexgenproject.com,
[3] F. Schaub, R. Deyhle, and M. Weber, “Password Entry Usabilityand Shoulder Surfing
Susceptibility on Different Smartphone Platforms,”in Proceedings of the 11th ACM International
Conference onMobile and Ubiquitous Multimedia, 2012.[4] A. J. Aviv, K. Gibson, E. Mossop,
M. Blaze, and J. M. Smith,“Smudge Attacks on Smartphone Touch Screens,” WOOT, vol.
10,pp. 1–7, 2010.
[5] The Apple Inc., “About Touch ID Security on iPhone and iPad,”https://support.apple.com/en-
us/HT204587.
[6] M. Shahzad, A. X. Liu, and A. Samuel, “Secure Unlocking ofMobile Touch Screen Devices
by Simple Gestures: You can seeit but you can not do it,” in Proceedings of ACM MobiCom,
2013.
[7] J. R. Kwapisz, G. M. Weiss, S. Moore et al., “Cell Phone-basedBiometric Identification,” in
Proceedings of IEEE Biometrics Compendium,2010.[8] D. Gafurov, K. Helkala, and T. Søndrol,
“Biometric Gait AuthenticationUsing Accelerometer Sensor,” Journal of Computers, vol. 1,no. 7,
pp. 51–59, 2006.
[9] C. Yuan, X. Sun, and R. Lv, “Fingerprint Liveness Detection Basedon Multi-Scale LPQ and
PCA,” China Communications, vol. 13,no. 7, pp. 60–65, 2016.
[10] F. Monrose, M. K. Reiter, and S. Wetzel, “Password HardeningBased on Keystroke
Dynamics,” International Journal of InformationSecurity, vol. 1, no. 2, pp. 69–83, 2002.
[11] S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, “KeystrokebasedUser Identification
on Smart Phones,” in Proceedings ofthe 12th International Symposium on Recent Advances in
IntrusionDetection. Springer, 2009.
[12] A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann,“Touch Me Once and I
Know It’s You!: Implicit AuthenticationBased on Touch Screen Patterns,” in Proceedings of
ACM SIGCHI,2012.

More Related Content

What's hot

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
 
MobileIron Threat Defense
MobileIron Threat DefenseMobileIron Threat Defense
MobileIron Threat Defense
mobileironmarketing
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
IRJET Journal
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
 
I018145157
I018145157I018145157
I018145157
IOSR Journals
 

What's hot (7)

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
MobileIron Threat Defense
MobileIron Threat DefenseMobileIron Threat Defense
MobileIron Threat Defense
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
I018145157
I018145157I018145157
I018145157
 

Similar to SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
Nexgen Technology
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
csandit
 
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
cscpconf
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 
Dm36678681
Dm36678681Dm36678681
Dm36678681
IJERA Editor
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET Journal
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
Uvaraj Shan
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
IRJET Journal
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
CSCJournals
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
Venkat Projects
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
eSAT Publishing House
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
International Journal of Computer and Communication System Engineering
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
IJCI JOURNAL
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
Adrit Techno Solutions
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
Uvaraj Shan
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
Kamal Spring
 

Similar to SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES (20)

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEMA SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM
 
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
Study on analysis of commercial mobile keypad schemes and modeling of shoulde...
 
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
STUDY ON ANALYSIS OF COMMERCIAL MOBILE KEYPAD SCHEMES AND MODELING OF SHOULDE...
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Dm36678681
Dm36678681Dm36678681
Dm36678681
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 

SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES

  • 1. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, SHAKEIN: SECURE USER AUTHENTICATION OFSMARTPHONES WITH HABITUAL SINGLE-HANDEDSHAKES ABSTRACT Smartphones have been widely used with a vast array of sensitive and private information stored on these devices. Tosecure such information from being leaked, user authentication schemes are necessary. Current password/pattern-based userauthentication schemes are vulnerable to shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes aresecure but inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication scheme for secure unlockingof a smartphone by simply shaking the phone. With embedded motion sensors, ShakeIn can effectively capture the unique and reliablebiometrical features of users about how they shake. In this way, even if an attacker sees a user shaking his/her phone, the attacker canhardly reproduce the same behaviour. Furthermore, by allowing users to customise the way how they shake the phone, ShakeInendows users with the maximum operation flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations andreal experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple months. The results show that ShakeInachieves an average equal error rate of 1:2% with a small number of shakes using only 35 training samples even in the presence ofshoulder-surfing attacks. PROPOSED SYSTEM: we propose a smartphone user authenticationscheme, called ShakeIn, based on customised single-handed shakes. As shown in Figure 1(a), a shake refers to ato-and-fro movement with one hand holding a smartphoneand swinging the x- and y-axis coordinate plane of thephone around the elbow in the air. In essence, ShakeInadopts a machine learning methodology, consisting of atraining phase and an authentication phase. More specifically,in the training phase, ShakeIn first
  • 2. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, asks a legitimateuser to choose his/her preferred shaking styles and collectsa small number of shakes. For each of such shakes, uniqueand reliable biometrical features are derived from the rawreadings of the embedded 3D accelerometer and the gyroscopesensors, and then utilised to establish a SupportingVector Machines (SVM) classifier. In the authenticationphase, ShakeIn use the pre-trained classifier to verify thelegitimacy of shaking attempts from a user and unlock thephone if the user passes the verification. The key insightbehind ShakeIn is that people have consistent and distinguishingphysiological characteristics (e.g., the physicalstructure of the arm) and behavioural characteristics (e.g.,shaking behaviour patterns) while doing shakes EXISTIONG SYSTEM: Several schemes have been proposed that utilise theaccelerometer in smartphones to recognise human biometricgait. In general, these schemes have low true positive ratesas it is sensitive to many uncontrollable factors such as thephone placement and the types of the ground surface andshoes. Other physiological characteristics such as fingerprints, face and sound could be utilised for authentication.Typing behaviour with physical keyboards can be utilisedto authenticate users but the performance of theseschemes when applied to smartphones is uncertain as typingbehaviour on touch screens is more difficult to model.Some schemes have been proposed to draw specialgestures on the touch screen of a smartphone for authentication.OpenSesame and uWave are the two schemesmostly related to our work. OpenSesame allows users toshake or roll their phones with no special requirementsand derives four types of geometric features with threeaxisraw acceleration readings. Probability density functions(PDFs) of those feature samples are further used to trainclassifiers and verify a user. UWave can verify the legitimacyof a user by comparing the time series of three-axisacceleration readings of a testing gesture drawn in the airto a pre-defined template library by employing dynamictime warping (DTW). These schemes have relatively highfalse positive errors especially under shoulder-surfing attacks.ShakeIn differs from both schemes essentially in howfeatures are
  • 3. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, extracted. In ShakeIn, both physiological andbehavioural characteristics are considered, which makesShakeIn easy to use and at the same time resilient toshoulder-surfing attacks CONCLUSION In this paper, we have proposed a smartphone user authenticationscheme, called ShakeIn, based on customised onehandshakes. ShakeIn is resilient to shoulder-surfing andbiometrics hacking attacks as it adopts both physiologicaland behavioural characteristics to profile users. Furthermore,ShakeIn is handy as it allows customised shakes andsingle-hand operations. ShakeIn is quite reliable and canwork well with different modes of transport. As ShakeInneeds only off-the-shelf devices, it is easy to gain a widedeployment. Nevertheless, ShakeIn also has several limitations.For example, if a user forgets how he/she shakesduring the training phase, it is very likely for ShakeInto refuse this user for unlocking. We suggest that a userchooses the most comfortable shaking styles as his/her“passwords”. Another limitation of ShakeIn is that currentlyit can work with two common people postures, i.e., sittingand standing. It would be more practical if more posturesare supported. In addition, extending ShakeIn to other mobiledevices bigger than smartphones in size such as tabletsis also challenging. Moreover, we would also investigate touse more advanced classifiers such as Structural MinimaxProbability Machine in the future. REFERENCES [1] European Union Agency for Network and InformationSecurity, “Top Ten Smartphone Risks,”https://www.enisa.europa.eu/activities/Resilience-andCIIP/critical- applications/smartphone-security-1/top-ten-risks. [2] F. Tari, A. Ozok, and S. H. Holden, “A Comparison of Perceivedand Real Shoulder-surfing Risks between Alphanumeric andGraphical Passwords,” in Proceedings of the second ACM Symposiumon Usable privacy and security, 2006, pp. 56–66.
  • 4. CONTACT: PRAVEEN KUMAR. L (,+91 – 9791938249) MAIL ID: , praveen@nexgenproject.com Web: www.nexgenproject.com, [3] F. Schaub, R. Deyhle, and M. Weber, “Password Entry Usabilityand Shoulder Surfing Susceptibility on Different Smartphone Platforms,”in Proceedings of the 11th ACM International Conference onMobile and Ubiquitous Multimedia, 2012.[4] A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith,“Smudge Attacks on Smartphone Touch Screens,” WOOT, vol. 10,pp. 1–7, 2010. [5] The Apple Inc., “About Touch ID Security on iPhone and iPad,”https://support.apple.com/en- us/HT204587. [6] M. Shahzad, A. X. Liu, and A. Samuel, “Secure Unlocking ofMobile Touch Screen Devices by Simple Gestures: You can seeit but you can not do it,” in Proceedings of ACM MobiCom, 2013. [7] J. R. Kwapisz, G. M. Weiss, S. Moore et al., “Cell Phone-basedBiometric Identification,” in Proceedings of IEEE Biometrics Compendium,2010.[8] D. Gafurov, K. Helkala, and T. Søndrol, “Biometric Gait AuthenticationUsing Accelerometer Sensor,” Journal of Computers, vol. 1,no. 7, pp. 51–59, 2006. [9] C. Yuan, X. Sun, and R. Lv, “Fingerprint Liveness Detection Basedon Multi-Scale LPQ and PCA,” China Communications, vol. 13,no. 7, pp. 60–65, 2016. [10] F. Monrose, M. K. Reiter, and S. Wetzel, “Password HardeningBased on Keystroke Dynamics,” International Journal of InformationSecurity, vol. 1, no. 2, pp. 69–83, 2002. [11] S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, “KeystrokebasedUser Identification on Smart Phones,” in Proceedings ofthe 12th International Symposium on Recent Advances in IntrusionDetection. Springer, 2009. [12] A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann,“Touch Me Once and I Know It’s You!: Implicit AuthenticationBased on Touch Screen Patterns,” in Proceedings of ACM SIGCHI,2012.