Design and evaluation of new sensors-based smartphone authentication techniques

This study aims to design, develop, and test new sensor-based smartphone authentication techniques with the use of new sensors, namely 3D-touch and microphone sensors, with the former being used to simulate the hardware of the 3D- touch sensor of iPhone. Essentially, a 3D-touch sensor converts the a...

Full description

Saved in:
Bibliographic Details
Main Author: Alrufaye, Moceheb Lazam Shuwandy
Format: thesis
Language:eng
Published: 2019
Subjects:
Online Access:https://ir.upsi.edu.my/detailsg.php?det=6972
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:ir.upsi.edu.my:6972
record_format uketd_dc
institution Universiti Pendidikan Sultan Idris
collection UPSI Digital Repository
language eng
topic
spellingShingle
Alrufaye, Moceheb Lazam Shuwandy
Design and evaluation of new sensors-based smartphone authentication techniques
description This study aims to design, develop, and test new sensor-based smartphone authentication techniques with the use of new sensors, namely 3D-touch and microphone sensors, with the former being used to simulate the hardware of the 3D- touch sensor of iPhone. Essentially, a 3D-touch sensor converts the authentication pattern of Android devices into a multi-layer pattern. For the microphone sensor, an authentication method based on a silent air-blowing technique was proposed and developed. The proposed authentication schemes were tested, evaluated, and validated based on several scenarios. Two experimental settings, namely controlled and uncontrolled, were used to test the usability (i.e., the remember rate) of the authentication schemes with a sample size of 92 participants, consisting of 60 males and 32 females. False Reject Rate (FRR) and False Accept Rate (FAR) were utilized to analyze the security performance of such schemes by exposing each authentication pattern to various measures o FRR and FAR. Finally, a comparison of groups was performed to compare the analysis that helped provide greater insight into such usability measures. The results showed that the remember rates of the 3D-touch and microphone sensors were 26.25% and 8.22%, respectively, under the uncontrolled setting. In contrast, under the controlled setting, the remember rates of the 3D-touch and microphone sensors were 40.51% and 42.30%, respectively. Also, the FRR and FAR measures of the 3D-touch sensor were 66.73% and 0.15%, respectively. For the microphone sensor, the FRR and FAR measures were 58.04% and 39.17%, respectively. Also, the average results of the 3-Dimension Touchscreen Pattern Test (3DTPT) and Blowing-Voiceless Password (BVP) for both genders were 34.78% and 22.36%, respectively. In conclusion, the research findings were promising despite stringent experimental restrictions. The implication of this study is that the improvement of current sensor-based authentication techniques can be achieved based on the usability of such techniques.
format thesis
qualification_name
qualification_level Doctorate
author Alrufaye, Moceheb Lazam Shuwandy
author_facet Alrufaye, Moceheb Lazam Shuwandy
author_sort Alrufaye, Moceheb Lazam Shuwandy
title Design and evaluation of new sensors-based smartphone authentication techniques
title_short Design and evaluation of new sensors-based smartphone authentication techniques
title_full Design and evaluation of new sensors-based smartphone authentication techniques
title_fullStr Design and evaluation of new sensors-based smartphone authentication techniques
title_full_unstemmed Design and evaluation of new sensors-based smartphone authentication techniques
title_sort design and evaluation of new sensors-based smartphone authentication techniques
granting_institution Universiti Pendidikan Sultan Idris
granting_department Fakulti Seni, Komputeran dan Industri Kreatif
publishDate 2019
url https://ir.upsi.edu.my/detailsg.php?det=6972
_version_ 1747833339509735424
spelling oai:ir.upsi.edu.my:69722022-04-12 Design and evaluation of new sensors-based smartphone authentication techniques 2019 Alrufaye, Moceheb Lazam Shuwandy This study aims to design, develop, and test new sensor-based smartphone authentication techniques with the use of new sensors, namely 3D-touch and microphone sensors, with the former being used to simulate the hardware of the 3D- touch sensor of iPhone. Essentially, a 3D-touch sensor converts the authentication pattern of Android devices into a multi-layer pattern. For the microphone sensor, an authentication method based on a silent air-blowing technique was proposed and developed. The proposed authentication schemes were tested, evaluated, and validated based on several scenarios. Two experimental settings, namely controlled and uncontrolled, were used to test the usability (i.e., the remember rate) of the authentication schemes with a sample size of 92 participants, consisting of 60 males and 32 females. False Reject Rate (FRR) and False Accept Rate (FAR) were utilized to analyze the security performance of such schemes by exposing each authentication pattern to various measures o FRR and FAR. Finally, a comparison of groups was performed to compare the analysis that helped provide greater insight into such usability measures. The results showed that the remember rates of the 3D-touch and microphone sensors were 26.25% and 8.22%, respectively, under the uncontrolled setting. In contrast, under the controlled setting, the remember rates of the 3D-touch and microphone sensors were 40.51% and 42.30%, respectively. Also, the FRR and FAR measures of the 3D-touch sensor were 66.73% and 0.15%, respectively. For the microphone sensor, the FRR and FAR measures were 58.04% and 39.17%, respectively. Also, the average results of the 3-Dimension Touchscreen Pattern Test (3DTPT) and Blowing-Voiceless Password (BVP) for both genders were 34.78% and 22.36%, respectively. In conclusion, the research findings were promising despite stringent experimental restrictions. The implication of this study is that the improvement of current sensor-based authentication techniques can be achieved based on the usability of such techniques. 2019 thesis https://ir.upsi.edu.my/detailsg.php?det=6972 https://ir.upsi.edu.my/detailsg.php?det=6972 text eng closedAccess Doctoral Universiti Pendidikan Sultan Idris Fakulti Seni, Komputeran dan Industri Kreatif Abate, A. F., Nappi, M., & Ricciardi, S. (2017). I-Am: Implicitly Authenticate Me Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 113. https://doi.org/10.1109/TSMC.2017.2698258Adib, F., Hsu, C. Y., Mao, H., Katabi, D., & Durand, F. (2015). Capturing the human figure through a wall. ACM Transactions on Graphics (TOG), 34(6), 219.Ahmad, M., Khan, A. M., Brown, J. A., Protasov, S., & Khattak, A. M. (2016). Gait fingerprinting-based user identification on smartphones. Proceedings of the International Joint Conference on Neural Networks, 2016Octob, 30603067. https://doi.org/10.1109/IJCNN.2016.7727588Ali, Z., Payton, J., & Sritapan, V. (2016). At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices. Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 272275. https://doi.org/10.1109/SPW.2016.29Ali Fahmi, P. N., Kodirov, E., Choi, D. J., Lee, G. S., Mohd Fikri Azli, A., & Sayeed,S. (2012). Implicit authentication based on ear shape biometrics using smartphone camera during a call. Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, (27), 22722276. https://doi.org/10.1109/ICSMC.2012.6378079Aviv, A. J., Sapp, B., Blaze, M., & Smith, J. M. (2012). Practicality of accelerometer side channels on smartphones. Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC 12, 41.https://doi.org/10.1145/2420950.2420957Bajrami, G., Derawi, M. O., & Bours, P. (2011). Towards an automatic gait recognition system using activity recognition (wearable based). 2011 Third International Workshop on Security and Communication Networks (IWSCN), 2330. https://doi.org/10.1109/IWSCN.2011.6827713Buriro, A., Crispo, B., DelFrari, F., & Wrona, K. (2016). Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication. Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 276285. https://doi.org/10.1109/SPW.2016.20Casanova, J. G., vila, C. S., De Santos Sierra, A., Del Pozo, G. B., & Vera, V. J. (2010). A real-time in-air signature biometric technique using a mobile device embedding an accelerometer. Communications in Computer and Information Science, 87 CCIS(PART 1), 497503. https://doi.org/10.1007/978-3-642-14292- 5_50Chen, S., Pande, A., and Mohapatra, P. (2014). Sensor-Assisted Facial Recognition : An Enhanced Bio- metric Authentication System for Smartphones. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services MobiSys 14, 109122. https://doi.org/10.1145/2594368.2594373Cheng, P., Bagci, I. E., Roedig, U., & Yan, J. (2018). SonarSnoop: active acoustic side- channel attacks. International Journal of Information Security, 1-16. arXiv preprint arXiv:1808.10250.Corpus, K. R., Gonzales, R. J. D., Morada, A. S., & Vea, L. A. (2016). Mobile user identification through authentication using keystroke dynamics and accelerometer biometrics. Proceedings of the International Workshop on Mobile Software Engineering and Systems - MOBILESoft 16, 1112. https://doi.org/10.1145/2897073.2897111Crouse, D., Han, H., Chandra, D., Barbello, B., & Jain, A. K. (2015, May). Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data. In 2015 International Conference on Biometrics (ICB) (pp. 135-142). IEEE.Dandachi, G., El Hassan, B., & El Husseini, A. (2013, September). A novel identification/verification model using smartphone's sensors and user behavior. In 2013 2nd International Conference on Advances in Biomedical Engineering (pp. 235-238). IEEE.Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014). The Tangled Web of Password Reuse. Proceedings 2014 Network and Distributed System Security Symposium. doi:10.14722/ndss.2014.23357Derawi, M. O., Bours, P., & Holien, K. (2010). Improved cycle detection for accelerometer based gait authentication. Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, 312317. https://doi.org/10.1109/IIHMSP.2010.84Derawi, M. O., Nickely, C., Bours, P., & Busch, C. (2010). Unobtrusive user- authentication on mobile phones using biometric gait recognition. Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010, 306311. https://doi.org/10.1109/IIHMSP.2010.83Dhanakoti, V., & Manju Priya, R. (2016). Mobile handswing pattern. International Journal of Control Theory and Applications, 9(5), pp. 24972507.Fantana, A. L., Ramachandran, S., Schunck, C. H., & Talamo, M. (2016). Movement based biometric authentication with smartphones. Proceedings - International Carnahan Conference on Security Technology, 2015Janua(18), 235239. https://doi.org/10.1109/CCST.2015.7389688Feng, T., DeSalvo, N., Xu, L., Zhao, X., Wang, X., & Shi, W. (2014). Secure Session on Mobile: An Exploration on Combining Biometric, TrustZone, and User Behavior. Proceedings of the 6th International Conference on Mobile Computing, Applications and Services, 1(4), 206215. https://doi.org/10.4108/icst.mobicase.2014.257767Feng, T., Prakash, V., & Shi, W. (2013). Touch panel with integrated fingerprint sensors based user identity management. 2013 IEEE International Conference on Technologies for Homeland Security, HST 2013, (12), 154160. https://doi.org/10.1109/THS.2013.6698992Feng, T., Zhao, X., Carbunar, B., & Shi, W. (2013). Continuous mobile authentication using virtual key typing biometrics. Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, (21), 15471552. https://doi.org/10.1109/TrustCom.2013.272Ferriday, C. (2007). A Review Paper on Decision Table-Based Testing. Swansea University, CS339-2007, 20, 952-965. Retrieved from http://www.cs.swan.ac.uk/~csmarkus/CS339/dissertations/FerridayC.pdfGoethem(B), T. Van, Scheepers, W., Preuveneers, D., & Joosen, and W. (2016). Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9639, 106 121. https://doi.org/10.1007/978-3-319-30806-7Guerra-Casanova, J., Sanchez-Avila, C., Bailador Del Pozo, G., & De Santos-Sierra,A. (2013). a Sequence Alignment Approach Applied To a Mobile Authentication Technique Based on Gestures. International Journal of Pattern Recognition and Artificial Intelligence, 27(4), 1356006.https://doi.org/10.1142/S0218001413560065Guerra-Casanova, J., Snchez- vila, C., De Santos Sierra, A., & Del Pozo, G. B. (2011). Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures. Journal of Systems and Software, 84(11), 20132021. https://doi.org/10.1016/j.jss.2011.05.059Guerra-Casanova, J., Snchez-vila, C., Bailador, G., & de Santos Sierra, A. (2012). Authentication in mobile devices through hand gesture recognition. International Journal of Information Security, 11(2), 6583. https://doi.org/10.1007/s10207- 012-0154-9Haque, M. M., Zawoad, S., & Hasan, R. (2013). Secure techniques and methods for authenticating visually impaired mobile phone users. 2013 IEEE International Conference on Technologies for Homeland Security, HST 2013, (14), 735740. https://doi.org/10.1109/THS.2013.6699095Hoang, T., Choi, D., & Nguyen, T. (2015a). Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. International Journal of Information Security, 14(6), 549560. https://doi.org/10.1007/s10207-015-0273-1Hoang, T., Choi, D., & Nguyen, T. (2015, July). On the instability of sensor orientation in gait verification on mobile phone. In 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE) (Vol. 4, pp. 148-159). IEEE.Hoang, T., Nguyen, T., Luong, C., Do, S., & Choi, D. (2013). Adaptive cross-device gait recognition using a mobile accelerometer. Journal of Information Processing Systems, 9(2), 333348. https://doi.org/10.3745/JIPS.2013.9.2.333Hupperich, T., Hosseini, H., & Holz, T. (2016). Leveraging sensor fingerprinting for mobile device authentication. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9721, 377396. https://doi.org/10.1007/978-3-319-40667-1_19Hussain, M., Al-Haiqi, A., Zaidan, A. A., Zaidan, B. B., Mat Kiah, M. L., Anuar, N. B., & Abdulnabi, M. (2016). The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive and Mobile Computing, 25, 125. https://doi.org/10.1016/j.pmcj.2015.12.001Islam, S., Naeem, U., & Amin, Y. (2017). Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors (Switzerland). https://doi.org/10.3390/s17092043Jain, A., & Kanhangad, V. (2015). Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures. Pattern Recognition Letters, 68, 351360. https://doi.org/10.1016/j.patrec.2015.07.004Julkunen, H., & Ceder Molander, J. (2016). Password strength and memorability (Dissertation). Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva- 12568.Ketabdar, H., Moghadam, P., Naderi, B., & Roshandel, M. (2012). Magnetic signatures in air for mobile devices. Proceedings of the 14th International Conference on Human-Computer Interaction with Mobile Devices and Services Companion - MobileHCI 12, 185. https://doi.org/10.1145/2371664.2371705Kong, Yan, J., Blackwell, A., Anderson, R., & Grant, A. (2004). Password memorability and security: Empirical results. IEEE Security & privacy, 2(5), 25- 31.Kumar, R., Phoha, V. V., & Jain, A. (2015). Treadmill attack on gait-based authentication systems. 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015.https://doi.org/10.1109/BTAS.2015.7358801Kwapisz, J. R., Weiss, G. M., & Moore, S. A. (2010, September). Cell phone-based biometric identification. In 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) (pp. 1-7). IEEE.Laghari, A., & Memon, Z. A. (2016). Biometric Authentication Technique Using Smartphone Sensor. 2016 13th International Bhurban Conference on 2016 Jan 12 IEEE, (20), 381384.Lee, S., Song, K., & Choi, J. (2012). Access to an automated security system using gesture-based passwords. Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012, (25), 760765. https://doi.org/10.1109/NBiS.2012.136Lee, W. H. & Lee R. B., & Princeton. (2015). Implicit Authentication for Smartphone Security. Information Systems Security and Privacy, Springer 2015, (576), 160- 176. https://doi.org/10.1007/978-3-319-27668-7Lee, W., & Lee, R. B. (2015). Multi-sensor Authentication to Improve Smartphone Security. In Conference on Information Systems Security and Privacy, IEEE, 1 11. https://doi.org/10.5220/0005239802700280Li, Y., Li, Y., Yan, Q., Kong, H., & Deng, R. H. (2015). Seeing Your Face Is Not Enough : An Inertial Sensor-Based Liveness Detection for Face Authentication. ACM SIGSAC Conference on Computer and Communications Security, 1558 1569. https://doi.org/10.1145/2810103.2813612Lin, C. C., Chang, C. C., Liang, D., & Yang, C. H. (2012). A new non-intrusive authentication method based on the orientation sensor for smartphone users. Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012, (24), 245252. https://doi.org/10.1109/SERE.2012.37Ling, Z., Luo, J., Chen, Q., Yue, Q., Yang, M., Yu, W., & Fu, X. (2016). Secure fingertip mouse for mobile devices. Proceedings - IEEE INFOCOM, 2016 July(16). https://doi.org/10.1109/INFOCOM.2016.7524368Liu, Q., Wang, M., Zhao, P., Yan, C., & Ding, Z. (2016). A Behavioral Authentication Method for Mobile Gesture Against Resilient User Posture. 2016 3rd International Conference on Systems and Informatics, ICSAI 2016, (Icsai), 324 331. https://doi.org/10.1109/ICSAI.2016.7810976Lyu, C., Pande, A., Wang, X., Zhu, J., Gu, D., & Mohapatra, P. (2015). CLIP: Continuous location integrity and provenance for mobile phones. Proceedings - 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, 172180. https://doi.org/10.1109/MASS.2015.33Maghsoudi, J., & Tappert, C. C. (2017). A behavioral biometrics user authentication study using motion data from android smartphones. Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016, 184187.https://doi.org/10.1109/EISIC.2016.047Mastic. (2011). Malaysian Research and Development Classification System 6th edition. Malaysian Science and Technology Information Center (MASTIC). https://doi.org/ISSN 1394-4320Muaaz, M., & Mayrhofer, R. (2013). An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. Proceedings of International Conference on Advances in Mobile Computing & Multimedia - MoMM 13, 293300. https://doi.org/10.1145/2536853.2536895Muaaz, M., & Mayrhofer, R. (2014). Orientation Independent Cell Phone Based Gait Authentication. Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia - MoMM 14, 161164. https://doi.org/10.1145/2684103.2684152Muaaz, M., & Mayrhofer, R. (2016). Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models. Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media - MoMM 16, 288291. https://doi.org/10.1145/3007120.3007164Muaaz M.; Mayrhofer R. (2015). Cross Pocket Gait Authentication Using Mobile Phone Based Accelerometer Sensor. 2015 In International Conference on Computer Aided Systems Theory, 731738. https://doi.org/10.1007/978-3-319- 27340-2Nader, J., Alsadoon, A., Prasad, P. W. C., Singh, A. K., & Elchouemi, A. (2015). Designing Touch-Based Hybrid Authentication Method for Smartphones. Procedia Computer Science, 70(28), 198204. https://doi.org/10.1016/j.procs.2015.10.072Nguyen, H., Nguyen, H. H., Hoang, T., Choi, D., & Nguyen, T. D. (2016). A Generalized Authentication Scheme For Mobile Phones Using Gait Signals, 386 407. https://doi.org/10.1007/978-3-319-30222-5_18Nguyen Ngoc Diep, Cuong Pham, and T. M. P. (2015). SigVer3D: Accelerometer based verification of 3-D signatures on mobile devices, 326, 353365. https://doi.org/10.1007/978-3-319-11680-8Nickel, C., Brandt, H., & Busch, C. (2011). Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices. Biosig, 5766. Retrieved from http://www.researchgate.net/publication/221234829_Classification_of_Accelerat ion_Data_for_Biometric_Gait_Recognition_on_Mobile_DevicesNickel, C., & Busch, C. (2013). Classifying accelerometer data via hidden Markov models to authenticate people by the way they walk. IEEE Aerospace and Electronic Systems Magazine, 28(10), 2935. https://doi.org/10.1109/MAES.2013.6642829Nickel, C., Derawi, M. O., Bours, P., & Busch, C. (2011). Scenario test of accelerometer-based biometric gait recognition. Proceedings of the 3rd International Workshop on Security and Communication Networks, IWSCN 2011, 1521. https://doi.org/10.1109/IWSCN.2011.6827712Nickel, C., Wirtl, T., & Busch, C. (2012). Authentication of smartphone users based on the way they walk using k-NN algorithm. Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012, 1620. https://doi.org/10.1109/IIH- MSP.2012.11Nixon, K. W., Chen, X., Mao, Z. H., Chen, Y., & Li, K. (2013). Mobile user classification and authorization based on gesture usage recognition. Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC, (11), 384389. https://doi.org/10.1109/ASPDAC.2013.6509626Owusu, E., Han, J., Das, S., Perrig, A., & Zhang, J. (2012). ACCessory: Password Inference Using Accelerometers on Smartphones. Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, 9:19:6. https://doi.org/10.1145/2162081.2162095Petry, N. M. (2002). A Comparison of Young , Middle-Aged , and Older Adult Treatment-Seeking Pathological Gamblers, 42(1), 9299.Pisani, P. H., Lorena, A. C., & De Carvalho, A. C. P. L. F. (2014). Adaptive algorithms in accelerometer biometrics. Proceedings - 2014 Brazilian Conference on Intelligent Systems, BRACIS 2014, 336341. https://doi.org/10.1109/BRACIS.2014.67Pisani, P. H., Lorena, A. C., & De Carvalho, A. C. P. L. F. (2017). Adaptive algorithms applied to accelerometer biometrics in a data stream context. Intelligent Data Analysis, 21(2), 353370. https://doi.org/10.3233/IDA-150403Rahman, F., Gani, M. O., Ahsan, G. M. T., & Ahamed, S. I. (2014). Seeing beyond visibility: A four way fusion of user authentication for efficient usable security on mobile devices. Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014, (8), 121129. https://doi.org/10.1109/SERE-C.2014.30Roshandel, M., Haji-Abolhassani, A., & Ketabdar, H. (2015). MagiThings: Gestural interaction with mobile devices based on using embedded compass (magnetic field) sensor. Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices. https://doi.org/10.4018/978-1-4666-8583-3.ch003Roy, A., Halevi, T., & Memon, N. (2015). An HMM-based multi-sensor approach for continuous mobile authentication. Proceedings - IEEE Military Communications Conference MILCOM, 2015Decem, 13111316. https://doi.org/10.1109/MILCOM.2015.7357626Rybnicek, M., Lang-Muhr, C., & Haslinger, D. (2014). A roadmap to continuous biometric authentication on mobile devices. 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), 122127. https://doi.org/10.1109/IWCMC.2014.6906343Sagar, S. Kumar, M. (2015). Gait biometrics as an authentication in smartphones. Research India Publications Journal, 10(55), 29542959. https://doi.org/10.1109/DICTA.2010.62Sanzziri, A., Nandugudi, A., Upadhyaya, S., & Qiao, C. (2013). SESAME: Smartphone enabled secure access to multiple entities. 2013 International Conference on Computing, Networking and Communications, ICNC 2013, (7), 879883. https://doi.org/10.1109/ICCNC.2013.6504205Schwarting, M., Burton, T., & Yampolskiy, R. (2016). On the obfuscation of image sensor fingerprints. Proceedings - 2015 Annual Global Online Conference on Information and Computer Technology, GOCICT 2015, 6669. https://doi.org/10.1109/GOCICT.2015.21Shen, C., Li, Y., Chen, Y., Guan, X., & Maxion, R. A. (2017). Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication. IEEE Transactions on Information Forensics and Security, 710049. https://doi.org/10.1109/TIFS.2017.2737969Shih, D.-H., Lu, C.-M., & Shih, M.-H. (2015). A flick biometric authentication mechanism on mobile devices. 2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS), 3133. https://doi.org/10.1109/ICCSS.2015.7281144Shila, D. M., Srivastava, K., ONeill, P., Reddy, K., & Sritapan, V. (2016). A multi- faceted approach to user authentication for mobile devices Using human movement, usage, and location patterns. 2016 IEEE Symposium on Technologies for Homeland Security (HST), (22), 16. https://doi.org/10.1109/THS.2016.7568944Sun, Z., & Wang, Y. (2015). A 3-D Hand Gesture Signature Based Biometric Authentication System for Smartphones, (2).Tamviruzzaman, M., Ahamed, S. I., Hasan, C. S., & Obrien, C. (2009). ePet: when cellular phone learns to recognize its owner. Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 1318. https://doi.org/10.1145/1655062.1655066Ur, B., Kelley, P. G., Komanduri, S., Lee, J., Maass, M., Mazurek, M. L., Cranor,L. F. (2012). How Does Your Password Measure Up ? The Effect of Strength Meters on Password Creation. D creation." USENIX Security Symposium, 6580.Vu, K. L., Proctor, R. W., Bhargav-spantzel, A., Tai, B. B., Cook, J., & Schultz, E. E. (2007). Improving password security and memorability to protect personal andorganizational information, 65, 744757. https://doi.org/10.1016/j.ijhcs.2007.03.007Wang, G., Zou, Y., Zhou, Z., Wu, K., & Ni, L. M. (2016). We can hear you with wi- fi!. IEEE Transactions on Mobile Computing, 15(11), 2907-2920.Wang, H., Lymberopoulos, D., & Liu, J. (2015, February). Sensor-based user authentication. In European Conference on Wireless Sensor Networks (pp. 168- 185). Springer, Cham.Watanabe, Y. (2014). Influence of holding smart phone for acceleration-based gait authentication. Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014, 3033. https://doi.org/10.1109/EST.2014.24Watanabe, Y., & Houryu, T. F. (2013). Toward introduction of immunity-based model to continuous behavior-based user authentication on smart phone. Procedia Computer Science, 22(1), 13191327. https://doi.org/10.1016/j.procs.2013.09.220Wei, T., Wang, S., Zhou, A., & Zhang, X. (2015, September). Acoustic eavesdropping through wireless vibrometry. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (pp. 130-141). ACM.Witte, H., Rathgeb, C., & Busch, C. (2013). Context-Aware Mobile Biometric Authentication based on Support Vector Machines. 2013 Fourth International Conference on Emerging Security Technologies, (6), 2932. https://doi.org/10.1109/EST.2013.38Wolff, M. (2013). Behavioral biometric identification on mobile devices. 2013 International Conference on Augmented Cognition, (Icsai), 783791. https://doi.org/10.1109/ICSAI.2016.7810976Yang, H., Chen, L., Bian, K., Tian, Y., Ye, F., Yan, W., Li, X. (2015). TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords. IEEE International Conference on Communications, 2015Septe(17), 71397144. https://doi.org/10.1109/ICC.2015.7249465Yang, L., Guo, Y., Ding, X., Han, J., Liu, Y., Wang, C., & Hu, C. (2015). Unlocking Smart Phone through Handwaving Biometrics. IEEE Transactions on Mobile Computing, 14(5), 10441055. https://doi.org/10.1109/TMC.2014.2341633Yuen, P. C., Zou, W. W., Zhang, S. B., Wong, K. K. F., & Lam, H. H. S. (2009). Finger gesture recognition through sweep sensor. Proceedings of the 1st International Workshop on Interactive Multimedia for Consumer Electronics - IMCE 09, 11 17. https://doi.org/10.1145/1631040.1631043Zheng, N., Bai, K., Huang, H., & Wang, H. (2014). You are how you touch: User verification on smartphones via tapping behaviors. Proceedings - International Conference on Network Protocols, ICNP, 221232. https://doi.org/10.1109/ICNP.2014.43Zhong, Y., Deng, Y., & Meltzner, G. (2015). Pace independent mobile gait biometrics. 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems, BTAS 2015. https://doi.org/10.1109/BTAS.2015.7358784Zhu, J., Wu, P., Wang, X., & Zhang, J. (2013). SenSec: Mobile security through passive sensing. 2013 International Conference on Computing, Networking and Communications, ICNC 2013, (9), 11281133. https://doi.org/10.1109/ICCNC.2013.6504251