To read this content please select one of the options below:

Mobile user signature extraction based on user behavioural pattern (MUSEP)

Hassan Sbeyti (Arab Open Univeristy, Omar Bayhoum, Beirut, Lebanon)
Beatrice El Hage (Arab Open Univeristy, Omar Bayhoum, Beirut, Lebanon)
Ahmad Fadlallah (Faculty of Arts and Sciences, University of Sciences and Arts in Lebanon (USAL), Beirut, Lebanon)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 7 November 2016

222

Abstract

Purpose

The purpose of this paper is to extract the user behaviour and transform it into a unique signature that can be used as implicit authentication technique. Smart devices are equipped with multiple authentication techniques and still remain prone to attacks because all of these techniques require explicit intervention of the user. Entering a pin code, a password or even having a biometric print can be easily hacked by an adversary.

Design/methodology/approach

In this paper, the authors introduce a novel authentication model to be used as complementary to the existing authentication models. Particularly, the duration of usage of each application and the occurrence time were examined and modelled into a user signature. During the learning phase, a cubic spline function is used to extract the user signature based on his/her behavioural pattern.

Findings

Preliminary field experiments show a 70 per cent accuracy rate in determining the rightful owner of the device.

Originality/value

The main contribution of this paper is a framework that extracts the user behaviour and transforms it into a unique signature that can be used to implicitly authenticate the user.

Keywords

Citation

Sbeyti, H., El Hage, B. and Fadlallah, A. (2016), "Mobile user signature extraction based on user behavioural pattern (MUSEP)", International Journal of Pervasive Computing and Communications, Vol. 12 No. 4, pp. 421-446. https://doi.org/10.1108/IJPCC-05-2016-0025

Publisher

:

Emerald Group Publishing Limited

Copyright © 2016, Emerald Group Publishing Limited

Related articles