Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.2.201

Biometric User Authentication Method of Mobile Application in Trustable Space  

Lee, Tae Kyong (Department of Computer and software, Hanyang University)
Kim, Yong Hyuk (Department of Computer and software, Hanyang University)
Im, Eul Gyu (Division of Computer Science and Engineering, Hanyang University)
Abstract
As services using mobile devices increase, exposure of personal information, and secure threats increase. In this paper, we propose a location-based user authentication system used in mobile device for tightening security. Our authentication system is performed to authenticate two steps. The first authentication is location authentication to ensure that the user accesses an application in trustable space. This authentication method uses an Access Point's information. The second authentication is trustable space authentication to confirm the normal user. This method is carried out the authentication by using biometric information from the user.
Keywords
Location-based Authentication; Access Point; Biometrics; Shaking Action;
Citations & Related Records
연도 인용수 순위
  • Reference
1 2014 Mobile Internet Usage Survey Summary Report, Korea Internet & Secur ity Agency : www.kisa.or.kr/uploadfile/201412/ 201412291354455289.pdf
2 Zhang, Feng, Aron Kondoro, and Sead Muftic, "Location-based authentication and authorization using smart phones, Trust, Security and Privacy" 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285-1292, June. 2012.
3 Ghogare, S. D., Jadhav, S. P., Chadha, A. R., and Patil, H. C., "Location based authentication: A new approach towards providing security." International Journal of Scientific and Research Publications, 2.4, pp.1-5, 2012.
4 Takamizawa, Hideyuki, and Noriko Tanaka, "Authentication system using location information on ipad or smartphone" International Journal of Computer Theory and Engineering, 4.2, pp.153-157, 2012.
5 Jansen, Wayne, and Vlad Korolev, "A location- based mechanism for mobile device security." Computer Science and Information Engineering, 2009 WRI World Congress on. IEEE, Vol. 1, pp. 99-104, Mar. 2009.
6 Jolliffe, Ian, "Principal component analysis." John Wiley & Sons, Ltd, 2002.
7 Kunnathu, Noufal, "Biometric User Authentication on Smartphone Accelerometer Sensor Data." Proceedings of Student-Faculty Research Day, CSIS, Pace University, 2015.
8 Derawi, Mohammad O., Patrick Bours, and Kjetil Holien, "Improved cycle detection for accelerometer based gait authentication." Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on. IEEE, pp. 312-317. 2010.
9 Tae Kyong Lee, Jun Hyoung Kim, Eul Gyu Im, "User Authentication Using Accelerometer Sensor of Mobile Device" Korea Computer Congress, 2016.
10 Witten, I. H., Frank, E., Trigg, L. E., Hall, M. A., Holmes, G., and Cunningham, S. J., "Weka: Practical machine learning tools and techniques with Java implementations." 2009.
11 Patil, T. R., and Sherekar, S. S., "Performance analysis of Naive Bayes and J48 classification algorithm for data classification." International Journal of Computer Science and Applications, 6.2, pp. 256-261, Apr. 2013.
12 Cao, L. J., Keerthi, S. S., Ong, C. J., Zhang, J. Q., Periyathamby, U., Fu, X. J., and Lee, H. P., "Parallel sequential minimal optimization for the training of support vector machines." IEEE Transactions on Neural Networks, 17.4, pp. 1039-1049 July. 2006,   DOI
13 Logistic Algorithm, http://weka.sourceforge.net/doc.dev/weka/classifiers/functions/Logistic.html. (last visited on 13 Sep 2016)
14 Liaw, A., and Wiener, M., "Classification and regression by randomForest." R news, 2.3, pp. 18-22, Dec. 2002.
15 Yang, Z. R., "Multi-layer Perceptron." Machine Learning Approaches To Bioinformatics. World Scientific, pp. 133-153, 2010.
16 Ravi, N., Dandekar, N., Mysore, P., and Littman, M. L, "Activity recognition from accelerometer data" AAAI. Vol. 5, pp. 1541-1546, 2005.
17 Tae Kyong Lee, Wang Le, Eul Gyu Im, "Enhanced Location-based User Authentication On Mobile Application Using Access Point Information." Conference on Information Security and Cryptography, 2016.