Identifying Smartphone Users based on their Activity Patterns via Mobile Sensing
نویسندگان
چکیده
Smartphones are ubiquitous devices that enable users to perform many of their routine tasks anytime and anywhere. With the advancement in information technology, smartphones are now equipped with sensing and networking capabilities that provide context-awareness for a wide range of applications. Due to ease of use and access, many users are using smartphones to store their private data, such as personal identifiers and bank account details. This type of sensitive data can be vulnerable if the device gets lost or stolen. The existing methods for securing mobile devices, including passwords, PINs and pattern locks are susceptible to many bouts such as smudge attacks. This paper proposes a novel framework to protect sensitive data on smartphones by identifying smartphone users based on their behavioral traits using smartphone embedded sensors. A series of experiments have been conducted for validating the proposed framework, which demonstrate its effectiveness. © 2017 The Authors. Published by Elsevier B.V. Peer-review under responsibility of the Conference Program Chairs.
منابع مشابه
Smart Diary: A Smartphone-based Framework for Sensing, Inferring and Logging Users’ Daily Life
In this paper, we present Smart Diary, a novel smartphone based framework that analyzes mobile sensing data to infer, predict, and summarize people’s daily activities, such as their behavioral patterns and life styles. Such activities are then used as the basis for knowledge representation, which generates personal digital diaries in an automatic manner. As users do not need to intentionally pa...
متن کاملSmartphone Sensing
The increasing popularity of smartphones with their embedded sensing capability and the availability of new application distribution channels, such as, the Apple AppStore and the Google Android Market, is giving researchers a unique opportunity to deploy mobile sensing applications at unprecedented scale and collect sensor data way beyond the boundaries of traditional small-scale research labor...
متن کاملMobile Malware Classification via System Calls and Permission for GPS Exploitation
Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smartphone users and based on profit gain. They spread faster among the users especially via the Android smartphones. They exploit the smartphones through many ways such as through ...
متن کاملAuthentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and ...
متن کاملA Little Bit of Labeled Data Can Get You Started Helping Mobile Apps Bootstrap with Fewer Users
A growing number of mobile apps are exploiting smartphone sensors to infer user behavior, activity, or context. Inference requires training using labeled ground truth data. Obtaining labeled data for new apps is a “chicken-egg” problem. Without a reasonable amount of labeled data, apps cannot provide any service. But until an app provides useful service it is not worth installing and has no opp...
متن کامل