Abstract

In the era of science and technology, the user of Smartphone is omnipresent, as the data of research shows the number of Smartphone users is rising exponentially. Earlier Mobile phones used for calling and sending messages. Technology has evolved, and presently Smartphone is used as multipurpose device. The smartphone is used for online shopping, reading books, listing music, clicking photo, recording video, internet access, digital banking, and many more sophisticated services. Access of Smartphone data must be by secure and user-friendly system of authentication. Authentication methods of traditional computer systems cannot fit as it is into Smartphone authentication due to small size screen for input. Presently fingerprint authentication, pattern authentications systems and many more are used for Smartphone authentication, but they are just providing the security at entry-level authentication. Once a user does entry-level authentication device is open for use, and unattended phone can be unauthorized access. There is research going on in the area where the unauthorized person must not have access even the device is in unlock state. This dimension of authentication is called continuous Smartphone authentication. Our focus in this paper is on continuous mobile authentication. In this paper dataset of 41 users is used. Feature selection methods for continuous Smartphone authenticationuses dominating features. For the better tradeoff OptAT performance parameter is proposed. The improvement of 16% has been achieved using this parameter. The learning curve also has been drowned for the features.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.