Title :
User authentication on smart phones using a data mining method
Author :
Yujin Tang ; Hidenori, N. ; Urano, Yuta
Author_Institution :
Grad. Sch. of Global Inf. & Telecommun. Studies, Waseda Univ., Tokyo, Japan
Abstract :
The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones´ also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones´ application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user´s habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme´s effectiveness.
Keywords :
Global Positioning System; authorisation; biometrics (access control); cellular radio; data mining; graph theory; human computer interaction; mobile computing; telecommunication security; GPS information; cell phones application history; data mining method; directional graphs; iPhone; mobile user authentication scheme; smart phones; Authentication; Cellular phones; Global Positioning System; History; Servers; Smart phones; Training;
Conference_Titel :
Information Society (i-Society), 2010 International Conference on
Conference_Location :
London
Print_ISBN :
978-1-4577-1823-6
Electronic_ISBN :
978-0-9564263-3-8