User authentication on smart phones using a data mining method

Yujin Tang, Hidenori Nakazato, Yoshiyori Urano

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)

    Abstract

    The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.

    Original languageEnglish
    Title of host publication2010 International Conference on Information Society, i-Society 2010
    Pages173-178
    Number of pages6
    Publication statusPublished - 2010
    Event2010 International Conference on Information Society, i-Society 2010 - London
    Duration: 2010 Jun 282010 Jun 30

    Other

    Other2010 International Conference on Information Society, i-Society 2010
    CityLondon
    Period10/6/2810/6/30

    Fingerprint

    Authentication
    Data mining
    Biometrics
    Global positioning system
    Hardware
    Experiments

    ASJC Scopus subject areas

    • Information Systems

    Cite this

    Tang, Y., Nakazato, H., & Urano, Y. (2010). User authentication on smart phones using a data mining method. In 2010 International Conference on Information Society, i-Society 2010 (pp. 173-178). [6018818]

    User authentication on smart phones using a data mining method. / Tang, Yujin; Nakazato, Hidenori; Urano, Yoshiyori.

    2010 International Conference on Information Society, i-Society 2010. 2010. p. 173-178 6018818.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Tang, Y, Nakazato, H & Urano, Y 2010, User authentication on smart phones using a data mining method. in 2010 International Conference on Information Society, i-Society 2010., 6018818, pp. 173-178, 2010 International Conference on Information Society, i-Society 2010, London, 10/6/28.
    Tang Y, Nakazato H, Urano Y. User authentication on smart phones using a data mining method. In 2010 International Conference on Information Society, i-Society 2010. 2010. p. 173-178. 6018818
    Tang, Yujin ; Nakazato, Hidenori ; Urano, Yoshiyori. / User authentication on smart phones using a data mining method. 2010 International Conference on Information Society, i-Society 2010. 2010. pp. 173-178
    @inproceedings{8425fdcc266340ddbb38c7fa09db51c9,
    title = "User authentication on smart phones using a data mining method",
    abstract = "The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.",
    author = "Yujin Tang and Hidenori Nakazato and Yoshiyori Urano",
    year = "2010",
    language = "English",
    isbn = "9780956426338",
    pages = "173--178",
    booktitle = "2010 International Conference on Information Society, i-Society 2010",

    }

    TY - GEN

    T1 - User authentication on smart phones using a data mining method

    AU - Tang, Yujin

    AU - Nakazato, Hidenori

    AU - Urano, Yoshiyori

    PY - 2010

    Y1 - 2010

    N2 - The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.

    AB - The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.

    UR - http://www.scopus.com/inward/record.url?scp=80053343817&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=80053343817&partnerID=8YFLogxK

    M3 - Conference contribution

    AN - SCOPUS:80053343817

    SN - 9780956426338

    SP - 173

    EP - 178

    BT - 2010 International Conference on Information Society, i-Society 2010

    ER -