{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:51:15Z","timestamp":1774716675634,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T00:00:00Z","timestamp":1663286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Reliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on \u201cdevice unlock\u201d scenario\u2014checking of information (authentication factors) provided by the user for unlocking a smartphone. As such factors, we may use either single strong authentication factor, for example, password or PIN, or several \u201cweaker\u201d factors, such as tokens, biometrics, or geolocation data. However, these solutions require additional actions from a user, for example, password typing or taking a fingerprint, that may be inappropriate for on-the-fly authentication. In addition, biometric-based user authentication systems tend to be prone to presentation attack (spoofing) and typically perform well in fixed positions only, such as still standing or sitting.<\/jats:p><jats:p>We propose BehaviorID solution that is passwordless (transparent) user-adaptive context-dependent authentication method. The feature of BehaviorID is usage of new \u201cdevice lock\u201d scenario\u2014smartphone is stayed unlocked and can be fast locked if non-owner\u2019s actions are detected. This is achieved by tracking of user\u2019s behavior with embedded sensors after triggering events, such as actions in banking apps, e-mails, and social services. The advanced adaptive recurrent neural network (A-RNN) is used for accurate estimation and adaptation of behavioral patterns to a new usage context. Thus, proposed BehaviorID solution allows reliable user authentication in various usage contexts by preserving low battery consumption.<\/jats:p><jats:p>Performance evaluation of both state-of-the-art and proposed solutions in various usage contexts proved the effectiveness of BehaviorID in real situations. Proposed solution allows reducing error levels up to three times in comparison with modern Abuhamad\u2019s solutions (Abuhamad et al., IEEE Internet Things J 7(6):5008\u20135020, 2020) (about <jats:inline-formula><jats:alternatives><jats:tex-math>$$0.3\\%$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>0.3<\/mml:mn>\n                    <mml:mo>%<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>\u00a0false acceptance rate (FAR) and <jats:inline-formula><jats:alternatives><jats:tex-math>$$1.3\\%$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>1.3<\/mml:mn>\n                    <mml:mo>%<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>\u00a0false rejection rate (FRR)) by preserving high robustness to spoofing attack (<jats:inline-formula><jats:alternatives><jats:tex-math>$$2.5\\%$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>2.5<\/mml:mn>\n                    <mml:mo>%<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>\u00a0spoof acceptance rate (SAR)). In addition, BehaviorID showed low drift of error level in case of long-term usage in contrast to modern solutions. This makes the proposed BehaviorID solution an attractive candidate for next-generation behavior-based user authentication systems on mobile devices.<\/jats:p>","DOI":"10.1186\/s13635-022-00132-x","type":"journal-article","created":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T21:02:44Z","timestamp":1663362164000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Behavior-based user authentication on mobile devices in various usage contexts"],"prefix":"10.1186","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1124-1497","authenticated-orcid":false,"given":"Dmytro","family":"Progonov","sequence":"first","affiliation":[]},{"given":"Valentyna","family":"Cherniakova","sequence":"additional","affiliation":[]},{"given":"Pavlo","family":"Kolesnichenko","sequence":"additional","affiliation":[]},{"given":"Andriy","family":"Oliynyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,16]]},"reference":[{"key":"132_CR1","unstructured":"M. Papadopouli, A. Arnes, J.A. Bombin, E. Boschi, S. Buchegger, R.B. Corti\u00f1as, et\u00a0al., Mobile identity management. IDM report. Eur. Netw. Inf. Secur. Agency. (2010). https:\/\/www.enisa.europa.eu\/publications\/Mobile20IDM. Accessed 24 June 2020"},{"key":"132_CR2","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11235-019-00612-5","volume":"73","author":"MA Ferrag","year":"2020","unstructured":"M.A. Ferrag, L. Maglaras, A. Derhab, H. Janicke, Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues. Telecommun. Syst. 73, 317\u2013348 (2020)","journal-title":"Telecommun. Syst."},{"key":"132_CR3","unstructured":"Google. Lockscreen and authentication improvements in Android 11. (2020). https:\/\/android-developers.googleblog.com\/2020\/09\/lockscreen-and-authentication.html. Accessed 23 May 2022"},{"key":"132_CR4","unstructured":"C. Wu, K. He, J. Chen, Z. Zhao, R. Du, Liveness is not enough: enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks. in 29th USENIX Security Symposium (USENIX Security 20) (2020), p. 2219\u20132236. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/wu. Accessed 12 July 2021"},{"key":"132_CR5","unstructured":"C. Burt, U.S. DISA develops prototype multi-biometric smartphone for \u201cassured identity\u201d. (2019). https:\/\/www.biometricupdate.com\/201908\/u-s-disa-develops-prototype-multi-biometric-smartphone-for-assured-identity. Accessed 23 May 2022"},{"key":"132_CR6","doi-asserted-by":"crossref","unstructured":"M. Ehatisham-ul Haq, M.A. Azam, J. Loo, K. Shuang, S. Islam, U. Naeem, et\u00a0al., Authentication of smartphone users based on activity recognition and mobile sensing. Sensors. 17(9), (2017). https:\/\/www.mdpi.com\/1424-8220\/17\/9\/2043. Accessed 12 July 2021","DOI":"10.3390\/s17092043"},{"key":"132_CR7","doi-asserted-by":"crossref","unstructured":"A. Alzubaidi, J. Kalita, Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998\u20132026 (2016)","DOI":"10.1109\/COMST.2016.2537748"},{"key":"132_CR8","unstructured":"O. Riva, C. Qin, K. Strauss, D. Lymberopoulos, Progressive authentication: deciding when to authenticate on mobile phones. in 21st USENIX Security Symposium (USENIX Security 12) (Bellevue, 2012), p. 301\u2013316. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/riva. Accessed 12 July 2021"},{"key":"132_CR9","doi-asserted-by":"crossref","unstructured":"M. Abuhamad, T. Abuhmed, D. Mohaisen, D. Nyang, AUToSen: deep-learning-based implicit continuous authentication using smartphone sensors. IEEE Internet Things J. 7(6), 5008\u20135020 (2020)","DOI":"10.1109\/JIOT.2020.2975779"},{"key":"132_CR10","unstructured":"A. Cser, M. Merritt, The future of identity and access management. FORRESTER Inc. (2019). https:\/\/www.forrester.com\/report\/The+Future+Of+Identity+And+Access+Management\/-\/E-RES136522. Accessed 24 Jun 2020"},{"key":"132_CR11","unstructured":"RSA SecurID Suite. https:\/\/www.rsa.com\/en-us\/products\/rsa-securid-suite. Accessed 24 Jun 2020"},{"key":"132_CR12","unstructured":"NuData Security. https:\/\/nudatasecurity.com\/. Accessed 24 Jun 2020"},{"key":"132_CR13","unstructured":"Apple Inc . Touch ID and Face ID technologies description. https:\/\/support.apple.com\/en-us\/HT208108. Accessed 24 Jun 2020"},{"key":"132_CR14","unstructured":"SecureAuth Identity Platform. https:\/\/www.secureauth.com\/products\/identity-platform. Accessed 24 Jun 2020"},{"key":"132_CR15","unstructured":"Amazon GuardDuty: protect your AWS accounts with intelligent threat detection. https:\/\/aws.amazon.com\/guardduty\/?nc1=h_ls. Accessed 23 May 2022"},{"key":"132_CR16","unstructured":"TwoSense.AI: continuous multifactor authentication. https:\/\/www.twosense.ai\/. Accessed 23 May 2022"},{"key":"132_CR17","unstructured":"Biometric signature ID. https:\/\/biosig-id.com\/. Accessed 23 May 2022"},{"key":"132_CR18","unstructured":"OneSpan: do more business with better security & simplified customer experiences. https:\/\/www.onespan.com\/. Accessed 23 May 2022"},{"key":"132_CR19","unstructured":"Zighra: insights and resources. https:\/\/zighra.com\/. Accessed 23 May 2022"},{"key":"132_CR20","unstructured":"Context-aware identity management framework. Alliance Telecommun. Ind. Solutions. (2018). https:\/\/access.atis.org\/apps\/group_public\/download.php\/43565\/ATIS-I-0000070.pdf. Accessed 24 Jun 2020"},{"key":"132_CR21","unstructured":"Ping identity announces the acquisition of SecuredTouch to accelerate identity fraud capabilities. https:\/\/www.pingidentity.com\/en\/company\/ping-newsroom\/press-releases\/2021\/securedtouch.html. Accessed 23 May 2022"},{"key":"132_CR22","unstructured":"E. Koster, Why Samsung NEXT and HYPR believe the future will be passwordless. https:\/\/news.samsung.com\/us\/samsung-next-hypr-believe-future-will-passwordless\/. Accessed 23 May 2022"},{"key":"132_CR23","unstructured":"H.G. Kayacik, et al. Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. Cornell University preprint repository. arXiv:1410.7743 (2014)"},{"key":"132_CR24","doi-asserted-by":"publisher","unstructured":"M.A. Alqarni, S.H. Chauhdary, M.N. Malik, et al., Identifying smartphone users based on how they interact with their phones. Hum. Cent. Comput. Inf. Sci. 10(7), (2020). https:\/\/doi.org\/10.1186\/s13673-020-0212-7","DOI":"10.1186\/s13673-020-0212-7"},{"issue":"5","key":"132_CR25","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3233\/IDA-2007-11508","volume":"11","author":"S Salvador","year":"2007","unstructured":"S. Salvador, P. Chan, Toward accurate dynamic time warping in linear time and space. Intell. Data Anal. 11(5), 561\u2013580 (2007)","journal-title":"Intell. Data Anal."},{"key":"132_CR26","unstructured":"K. Zhao, Y. Li, C. Zhang, C. Yang, H. Xu, Adaptive recurrent neural network based on mixture layer. (2018). arXiv e-prints. http:\/\/arxiv.org\/abs\/1801.08094"},{"key":"132_CR27","unstructured":"I. Goodfellow, Y. Bengio, A. Courville, Deep learning (The MIT Press, Cambridge, 2016)"},{"key":"132_CR28","doi-asserted-by":"crossref","unstructured":"W.H. Lee, X. Liu, Y. Shen, H. Jin, R.B. Lee, Secure pick up: implicit authentication when you start using the smartphone. (2017). arXiv e-prints. http:\/\/arxiv.org\/abs\/1708.09366","DOI":"10.1145\/3078861.3078870"},{"issue":"3","key":"132_CR29","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1108\/IJPCC-03-2015-0017","volume":"11","author":"K Murao","year":"2015","unstructured":"K. Murao, H. Tobise, T. Terada, T. Iso, M. Tsukamoto, T. Horikoshi, Mobile phone user authentication with grip gestures using pressure sensors. Int. J. Pervasive Comput. Commun. 11(3), 288\u2013301 (2015)","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"132_CR30","doi-asserted-by":"crossref","unstructured":"S.J. Alghamdi, L.A. Elrefaei, Dynamic authentication of smartphone users based on touchscreen gestures. Arab. J. Sci. Eng. 43, 789\u2013810 (2018)","DOI":"10.1007\/s13369-017-2758-x"},{"key":"132_CR31","doi-asserted-by":"publisher","unstructured":"M. Gholamrezaii, S.M. Taghi Almodarresi, \"Human Activity Recognition Using 2D Convolutional Neural Networks,\" 2019 27th Iranian Conference on Electrical Engineering (ICEE), pp. 1682\u20131686, (2019) https:\/\/doi.org\/10.1109\/IranianCEE.2019.8786578","DOI":"10.1109\/IranianCEE.2019.8786578"},{"key":"132_CR32","doi-asserted-by":"crossref","unstructured":"D. Garcia-Gonzalez, D. Rivero, E. Fernandez-Blanco, M.R. Luaces, A public domain dataset for human activity recognition using smartphones. Sensors. 20(8), (2020)","DOI":"10.3390\/s20082200"},{"key":"132_CR33","doi-asserted-by":"crossref","unstructured":"A. Logacjov, K. Bach, A. Kongsvold, H.B. B\u00e5rdstu, P.J. Mork. HARTH: a human activity recognition dataset for machine learning. Sensors (Basel). 21(23), (2021)","DOI":"10.3390\/s21237853"},{"key":"132_CR34","doi-asserted-by":"crossref","unstructured":"N. Sikder, A.A. Nahid, KU-HAR: an open dataset for heterogeneous human activity recognition. Pattern Recognit. Lett. 146, 46\u201354 (2021)","DOI":"10.1016\/j.patrec.2021.02.024"},{"key":"132_CR35","doi-asserted-by":"crossref","unstructured":"Y. Vaizman, K. Ellis, G. Lanckriet, Recognizing detailed human context in the wild from smartphones and smartwatches. IEEE Pervasive Comput. 16(4), 62\u201374 (2017)","DOI":"10.1109\/MPRV.2017.3971131"},{"key":"132_CR36","doi-asserted-by":"crossref","unstructured":"M. Malekzadeh, R.G. Clegg, A. Cavallaro, H. Haddadi, Mobile sensor data anonymization, in Proceedings of the International Conference on Internet of Things Design and Implementation. IoTDI \u201919. (ACM, New York, 2019), pp.49\u201358","DOI":"10.1145\/3302505.3310068"},{"key":"132_CR37","doi-asserted-by":"publisher","unstructured":"Y. Mirsky, A. Shabtai, L. Rokach, B. Shapira, Y. Elovici, \"Sherlock vs moriarty: A smartphone dataset for cybersecurity research\", Proc. ACM Workshop Artif. Intell. Secur. pp. 1\u201312, (2016). https:\/\/doi.org\/10.1145\/2996758.2996764","DOI":"10.1145\/2996758.2996764"},{"key":"132_CR38","doi-asserted-by":"crossref","unstructured":"Z. Sitov\u00e1, J. \u0160ed\u011bnka, Q. Yang, G. Peng, G. Zhou, P. Gasti et al., HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Inf. Forensic. Secur. 11(5), 877\u2013892 (2016)","DOI":"10.1109\/TIFS.2015.2506542"},{"key":"132_CR39","doi-asserted-by":"publisher","unstructured":"U. Mahbub, S. Sarkar, V.M. Patel, R. Chellappa, \"Active user authentication for smartphones: A challenge data set and benchmark results,\" 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), (2016), pp. 1\u20138, https:\/\/doi.org\/10.1109\/BTAS.2016.7791155","DOI":"10.1109\/BTAS.2016.7791155"},{"key":"132_CR40","unstructured":"A.K. Belman, L. Wang, S.S. Iyengar, P. Sniatala, R. Wright, R. Dora, et\u00a0al., Insights from BB-MAS \u2013 a large dataset for typing, gait and swipes of the same person on desktop, tablet and phone. (2019), arXiv e-prints. http:\/\/arxiv.org\/abs\/1912.02736"},{"key":"132_CR41","doi-asserted-by":"crossref","unstructured":"D. Reichinger, E. Sonnleitner, M. Kurz, Continuous mobile user authentication using combined biometric traits. Appl. Sci. 11(24), (2021)","DOI":"10.3390\/app112411756"},{"key":"132_CR42","doi-asserted-by":"crossref","unstructured":"Z. Shen, S. Li, X. Zhao, J. Zou, MMAuth: a continuous authentication framework on smartphones using multiple modalities. IEEE Trans. Inf. Forensic. Secur. 17, 1450\u20131465 (2022)","DOI":"10.1109\/TIFS.2022.3160361"},{"key":"132_CR43","unstructured":"G. Rowe, N. Nikols, D. Simmons, The future of identity management (2018-2023). TechVision Res. (2018). https:\/\/techvisionresearch.com\/wp-content\/uploads\/2018\/01\/The-Future-of-Identity-Management-2018-final.pdf. Accessed 24 Jun 2020"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00132-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-022-00132-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-022-00132-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T21:09:35Z","timestamp":1663362575000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-022-00132-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,16]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["132"],"URL":"https:\/\/doi.org\/10.1186\/s13635-022-00132-x","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,16]]},"assertion":[{"value":"15 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"6"}}