Figure 1: Flow of authentication.
prove their authenticity. Passwords, 2FA codes, and
biometrics-based authentication methods are consid-
ered to be not suitable to continuously authenticate
users due to the inconvenience of manually inputting
those information multiple times. The laborious pro-
cess of inputting such information led researchers to
look for implicit factors to be applied into continuous
authentication.
Implicit factors, such as user behaviors, are suit-
able for continuous authentication because they do
not require constant interaction from users and can
be done unobtrusively in the background without in-
terrupting user activities. Furthermore, behaviors are
unique to each person and hard to mimic by another
(Sitov
´
a, 2015). Methods to authenticate users by
learning from their past behaviors are often referred as
behavioral authentications methods. Behavioral au-
thentications also have their own issues. The unique
nature of people’s behaviors means that it is challeng-
ing to recognize the patterns that define them.
In this paper, we propose a method that recog-
nizes users behaviors through their location history
data gathered though their smartphone’s built-in GPS
(Global Positioning System) sensor. Our method con-
tinuously authenticates users based on their past be-
havioral patterns. When our proposed method recog-
nizes that the owner is no longer accompanying the
phone, smartphone developers may use those infor-
mation to lock access to the phone to prevent further
access by asking for explicit re-authentication, such
as passwords or facial expression (figure 1).
We implement deep neuroevolution models (Such,
2017), which combine Deep Neural Network (DNN)
architectures (Szegedy, 2013) with Genetic Algo-
rithm (GA) operations (Goldberg, 2006), to learn
from users location history and find patterns inside
their moving behaviors to regularly authenticate users
based on their current location. Through a collabora-
tive research project between our affiliated university
and various commercial companies, behavioral data
from over 7,000 smartphone users were collected.
To evaluate the feasibility of our proposed
method, we conducted early experiments on a small
number of users inside the dataset. Our early findings
from the experiments demonstrate that our model can
be used to detect anomaly in expected users’ locations
with relatively high accuracy.
2 RELATED WORK
Hsieh and Leu (Hsieh, 2011) proposed an authenti-
cation scheme which exploits One-Time Passwords
(OTPs) based on the time and location information of
the mobile device to authenticate users while access-
ing Internet services, such as online banking services
and e-commerce transactions. Their research demon-
strated that location information can be used to cor-
rectly authenticate genuine users. However, their re-
search is applicable only for a one-time authentication
session, instead of continuously repeated. This limi-
tation comes from the requirement to manually enter
SMS-based OTPs based the time and location.
Ghogare et al. (Ghogare 2012) also showed that
location can be used as one of the credentials to give
access to data only to legitimate user. However, their
system was not designed for smartphone users in
mind. They implemented dedicated GPS devices to
get the location information of users. The location in-
formation is transferred during an explicit authentica-
tion session so their location-based authentication ap-
proach is not suitable to implicitly authenticate users
in the background without interrupting user activities.
Zhang et al. (Zhang, 2012) applied a location-
based authentication for mobile transaction using
smartphones. Similar to Ghogare et al. research, their
authentication is also applied during an explicit au-
thentication session, instead of implicitly. However,
the location information in their research comes from
users smartphones, instead of separate GPS devices.
They showed that since users typically carry their
smartphones everyday and everywhere, the amount of
location information is richer and contribute towards
stronger location-based authentication.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
724