Fuzzy logic-based implicit authentication for mobile access control

Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
309 Downloads (Pure)

Abstract

In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.
Original languageEnglish
Title of host publicationSAI Computing Conference (SAI) 2016
Publisher IEEE
Number of pages8
ISBN (Electronic)978-1-4673-8460-5
DOIs
Publication statusPublished - 01 Sep 2016
Event2016 SAI Computing Conference (SAI) - London, United Kingdom
Duration: 13 Jul 201615 Jul 2016
http://www.saiconference.com/Conferences/Computing2016

Conference

Conference2016 SAI Computing Conference (SAI)
CountryUnited Kingdom
CityLondon
Period13/07/201615/07/2016
Internet address

Keywords

  • Authentication
  • fuzzy logic
  • fuzzy systems
  • access control
  • Android
  • behavior based authentication
  • implicit authentication

Fingerprint Dive into the research topics of 'Fuzzy logic-based implicit authentication for mobile access control'. Together they form a unique fingerprint.

  • Cite this