AuthCODE: A Privacy-preserving and Multi-device Continuous Authentication Architecture based on Machine and Deep Learning

The authentication field is evolving towards mechanisms able to keep users continuously authenticated without the necessity of remembering or possessing authentication credentials. While existing continuous authentication systems have demonstrated their suitability for single-device scenarios, the Internet of Things and next generation of mobile networks (5G) are enabling novel multi-device scenarios – such as Smart Offices – where continuous authentication is still an open challenge. The paper at hand, proposes an AI-based, privacy-preserving and multi-device continuous authentication architecture called AuthCODE. A realistic Smart Office scenario with several users, interacting with their mobile devices and personal computer, has been used to create a set of single- and multi-device behavioural datasets and validate AuthCODE. A pool of experiments with machine and deep learning classifiers measured the impact of time in authentication accuracy and improved the results of single-device approaches by considering multi-device behaviour profiles. The f1-score average reached for XGBoost on multi-device profiles based on 1-minute windows was 99.33 single devices was lower than 97.39 the form of vector sequences classified by a Long-Short Term Memory Network, allowed the identification of additional complex behaviour patterns associated to each user, resulting in an average f1-score of 99.02 long-term behaviours.


page 1

page 7

page 8

page 11


An HMM-based Multi-sensor Approach for Continuous Mobile Authentication

With the increased popularity of smart phones, there is a greater need t...

A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication

Continuous authentication utilizes automatic recognition of certain user...

Computer Users Have Unique Yet Temporally Inconsistent Computer Usage Profiles

This paper investigates whether computer usage profiles comprised of pro...

Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale

In this paper we provide evidence of an emerging criminal infrastructure...

BehavePassDB: Benchmarking Mobile Behavioral Biometrics

Mobile behavioral biometrics have become a popular topic of research, re...

Hands-Free One-Time and Continuous Authentication Using Glass Wearable Devices

Users with limited use of their hands, such as people suffering from dis...

Data-driven behavioural biometrics for continuous and adaptive user verification using Smartphone and Smartwatch

Recent studies have shown how motion-based biometrics can be used as a f...

Please sign up or login with your details

Forgot password? Click here to reset