(Maghsoudi, 2016) it is shown how hand movement
analysis can be used in user identification. All
necessary data was collected by built-in sensors of
the smartphone. In this case there is no need user
entering anything, all necessary authentication
information is being collected while user’s hand
with a phone is moving towards user’s ear. That’s
why an authentication method without any extra user
actions can be suggested providing authentication of
a person answering an incoming call.
The problem of incoming call authentication was
considered in (Conti, 2011). In this paper, the
researchers proposed to replace the input of the
password with the characteristics of the hand
movement when answering an incoming call. Data,
as in previous works, was obtained from built-in
sensors (accelerometer and orientation sensor). For
user authentication, Dynamic Time Warping
Distance and Dynamic Time Warping Similarity
algorithms were used. The basic idea of this
approach is to obtain the distance between the
coordinates of the vector of characteristics of the
legitimate user and the coordinates of such vectors
of the user in relation to which authentication is
performed. The closer the vector of the current user
to the legal user's vector, the more likely he is a
legitimate user. This approach is notable for its
simplicity. Using the training sample of 10 people’s
50 lifts of the phone, the system missed the attacker
in 4.4% of cases, and the legal user was blocked in
9.3% of cases. These study shows that the
movement of the hand when answering an incoming
call is unique for each person.
In (Buriro, 2017), a user authentication method
based on the "micromovements" of his hand right
after unlocking the smartphone on the Android OS is
presented. To receive data, built-in smartphone
sensors (accelerometer, gyroscope, magnetometer,
gravity sensor and orientation sensor) are used. In
addition, a low-pass filter and a high-pass filter are
applied to the data obtained from the accelerometer.
Thus, 7 data sources are used. The data acquisition
process starts immediately after receiving the
USER_PRESENT event at intervals of 2, 4, 6, 8 and
10 seconds. Then the following features were
calculated:
▪ mean;
▪ mean absolute deviation;
▪ median;
▪ standard error of the mean;
▪ standard deviation;
▪ skewness;
▪ kurtosis.
After this, feature vectors were formed, which
were fed to the input of various algorithms of
machine learning. It is worth noting that in this
paper the task of user identification was considered,
so, the classification problem was solved using the
machine learning algorithm. The authors gained the
following results: in 96% of cases the system
correctly identified the user using the Random
Forest algorithm.
3 DATA ACQUISITION AND
FEATURE SELECTION
The analysis showed that the movement of the hand
when answering an incoming call is unique for each
person and the information about this movement can
be used for user authentication. To perform it, it is
necessary to obtain data from the sensors of the
mobile phone, pre-process it and select features for
learning the algorithm.
3.1 First Look at the Problem
The problem of a mobile phone user authentication
when answering an incoming call has several limits
and speciality:
▪ limited time to perform authentication (having
no answer, the caller will simply "drop" the
call);
▪ limited operational memory of the device;
▪ the method used must be simple and user-
friendly.
Based on these limits, a method of authentication
based on behavioural biometrics was proposed, in
which the user would not need to perform any
additional actions, except for placing the phone to
his ear, as he usually does answering an incoming
call. This action becomes a source of the behavioural
biometrics data of the user.
We would like to focus your attention on the fact
that only standard sensors (gyroscope,
accelerometer, touch screen) are needed, and most of
modern smartphones are equipped with these
sensors.
3.2 Sensors Used and Data Obtained
In order to describe the movement of the phone in
space, it is necessary to obtain data from the sensors
of the phone. An event is generated in the Android
OS when a state of any sensor is changed.
According to the Android documentation, each
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
26