{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:40:17Z","timestamp":1760229617285,"version":"build-2065373602"},"reference-count":50,"publisher":"MDPI AG","issue":"13","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002278"],"award-info":[{"award-number":["62002278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>As mobile devices become more and more popular, users gain many conveniences. It has also made smartphone makers install new software and prebuilt hardware on their products, including many kinds of sensors. With improved storage and computing power, users also become accustomed to storing and interacting with personally sensitive information. Due to convenience and efficiency, mobile devices use gait authentication widely. In recent years, protecting the information security of mobile devices has become increasingly important. It has become a hot research area because smartphones are vulnerable to theft or unauthorized access. This paper proposes a novel attack model called a collusion attack. Firstly, we study the imitation attack in the general state and its results and propose and verify the feasibility of our attack. We propose a collusion attack model and train participants with quantified action specifications. The results demonstrate that our attack increases the attacker\u2019s false match rate only using an acceleration sensor in some systems sensor. Furthermore, we propose a multi-cycle defense model based on acceleration direction changes to improve the robustness of smartphone-based gait authentication methods against such attacks. Experimental results show that our defense model can significantly reduce the attacker\u2019s success rate.<\/jats:p>","DOI":"10.3390\/s22134711","type":"journal-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T23:11:19Z","timestamp":1655939479000},"page":"4711","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Continuous Authentication against Collusion Attacks"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-3158","authenticated-orcid":false,"given":"Pin","family":"Lyu","sequence":"first","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi\u2019an 710129, China"}]},{"given":"Wandong","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi\u2019an 710129, China"}]},{"given":"Yao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710129, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Alsellami, B.M., and Deshmukh, P.D. (2021, January 25\u201327). The Recent Trends in Biometric Traits Authentication Based on Internet of Things (IoT). Proceedings of the 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India.","DOI":"10.1109\/ICAIS50930.2021.9396007"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Yamada, S., and Matsunami, T. (2021, January 15\u201317). Evaluation on Biometric Accuracy Estimation Using Generalized Pareto (GP) Distribution. Proceedings of the 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany.","DOI":"10.1109\/BIOSIG52210.2021.9548295"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s10586-015-0510-4","article-title":"Continuous and transparent multimodal authentication: Reviewing the state of the art","volume":"19","author":"Clarke","year":"2016","journal-title":"Clust. Comput."},{"key":"ref_4","first-page":"4","article-title":"Surveying biometric authentication for mobile device security","volume":"1","author":"Neal","year":"2016","journal-title":"J. Pattern Recognit. Res."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/JIOT.2020.3020076","article-title":"Sensor-Based Continuous Authentication of Smartphones\u2019 Users Using Behavioral Biometrics: A Contemporary Survey","volume":"8","author":"Abuhamad","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_6","unstructured":"Gafurov, D. (2007, January 7). A survey of biometric gait recognition: Approaches, security and challenges. Proceedings of the Annual Norwegian Computer Science Conference, Olso, Norge."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1109\/TPAMI.2003.1251144","article-title":"Silhouette analysis-based gait recognition for human identification","volume":"25","author":"Wang","year":"2003","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/TCSVT.2003.821972","article-title":"Fusion of static and dynamic body biometrics for gait recognition","volume":"14","author":"Wang","year":"2004","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_9","unstructured":"Middleton, L., Buss, A.A., Bazin, A., and Nixon, M.S. (2005, January 17\u201318). A floor sensor system for gait recognition. Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID\u201905), Buffalo, NY, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/415817","article-title":"Gait recognition using wearable motion recording sensors","volume":"2009","author":"Gafurov","year":"2009","journal-title":"Eurasip J. Adv. Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Rong, L., Jianzhong, Z., Ming, L., and Xiangfeng, H. (2007, January 23\u201325). A Wearable Acceleration Sensor System for Gait Recognition. Proceedings of the 2007 2nd IEEE Conference on Industrial Electronics and Applications, Harbin, China.","DOI":"10.1109\/ICIEA.2007.4318894"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lyu, P., Cai, W., and Wang, Y. (2022). Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer.","DOI":"10.1007\/978-3-030-98005-4_7"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1109\/TMC.2019.2897933","article-title":"Security Properties of Gait for Mobile Device Pairing","volume":"19","author":"Nguyen","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2467","DOI":"10.1109\/TIFS.2017.2708690","article-title":"Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables","volume":"12","author":"Revadigar","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","article-title":"Fingerprint-Based Fuzzy Vault: Implementation and Performance","volume":"2","author":"Nandakumar","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., and Jain, A.K. (October, January 29). Multibiometric Template Security Using Fuzzy Vault. Proceedings of the 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, USA.","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","article-title":"ECG-Cryptography and Authentication in Body Area Networks","volume":"16","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TITB.2009.2037617","article-title":"PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks","volume":"14","author":"Venkatasubramanian","year":"2010","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hoang, T., and Choi, D. (2014). Secure and privacy enhanced gait authentication on smart phone. Sci. World J., 2014.","DOI":"10.1155\/2014\/438254"},{"key":"ref_20","unstructured":"Mjaaland, B.B. (2009). Gait mimicking: Attack Resistance Testing of Gait Authentication Systems. [Master\u2019s Thesis, Norwegian University of Science and Technology]."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, L.F., Jia, W., and Zhu, Y.H. (2009). Survey of gait recognition. Proceedings of the International Conference on Intelligent Computing, Information and Control Systems, Springer.","DOI":"10.1007\/978-3-642-04020-7_70"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Shrestha, B., Mohamed, M., and Saxena, N. (2019, January 26\u201328). ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics. Proceedings of the 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada.","DOI":"10.1109\/PST47121.2019.8949032"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TIFS.2007.902030","article-title":"Spoof Attacks on Gait Authentication System","volume":"2","author":"Gafurov","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_24","unstructured":"Jain, A.K., Ross, A., and Uludag, U. (2005, January 4\u20138). Biometric template security: Challenges and solutions. Proceedings of the 2005 13th European Signal Processing Conference, Antalya, Turkey."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3209","DOI":"10.1109\/TMC.2017.2686855","article-title":"Smartphone-Based Gait Recognition: From Authentication to Imitation","volume":"16","author":"Muaaz","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_26","first-page":"290","article-title":"Gait as a total pattern of movement: Including a bibliography on gait","volume":"46","author":"Murray","year":"1967","journal-title":"Am. J. Phys. Med. Rehabil."},{"key":"ref_27","first-page":"7","article-title":"Identifying people from gait pattern with accelerometers","volume":"5779","author":"Ailisto","year":"2005","journal-title":"Proc. Spie 5779, Biom. Technol. Hum. Identif."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1109\/TIFS.2015.2505626","article-title":"Magpairing: Pairing smartphones in close proximity using magnetometers","volume":"11","author":"Jin","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_29","unstructured":"Morris, S.J. (2004). A Shoe-Integrated Sensor System for Wireless Gait Analysis and Real-Time Therapeutic Feedback. [Ph.D. Thesis, Harvard-MIT Division of Health Sciences and Technology]."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Huang, B., Chen, M., Huang, P., and Xu, Y. (2007, January 10\u201314). Gait Modeling for Human Identification. Proceedings of the Proceedings 2007 IEEE International Conference on Robotics and Automation, Rome, Italy.","DOI":"10.1109\/ROBOT.2007.364224"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Nickel, C., Wirtl, T., and Busch, C. (2012, January 18\u201320). Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm. Proceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, Greece.","DOI":"10.1109\/IIH-MSP.2012.11"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Vildjiounaite, E., M\u00e4kel\u00e4, S.M., Lindholm, M., Riihim\u00e4ki, R., Kyll\u00f6nen, V., M\u00e4ntyj\u00e4rvi, J., and Ailisto, H. (2006, January 7\u201310). Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices. Proceedings of the International Conference on Pervasive Computing. Dublin, Ireland.","DOI":"10.1007\/11748625_12"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Heinz, E.A., Kunze, K.S., Sulistyo, S., Junker, H., Lukowicz, P., and Tr\u00f6ster, G. (2003, January 3\u20134). Experimental evaluation of variations in primary features used for accelerometric context recognition. Proceedings of the European Symposium on Ambient Intelligence. Veldhoven, The Netherlands.","DOI":"10.1007\/978-3-540-39863-9_19"},{"key":"ref_34","first-page":"369","article-title":"A cumulant-based method for gait identification using accelerometer data with principal component analysis and support vector machine","volume":"5","author":"Sprager","year":"2009","journal-title":"Wseas Trans. Signal Process."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Kwapisz, J.R., Weiss, G.M., and Moore, S.A. (2010, January 27\u201329). Cell phone-based biometric identification. Proceedings of the Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference, Washington, DC, USA.","DOI":"10.1109\/BTAS.2010.5634532"},{"key":"ref_36","unstructured":"Nickel, C. (2012). Accelerometer-Based Biometric Gait Recognition for Authentication on Smartphones. [Ph.D. Thesis, Technische Universit\u00e4t, The Technical University of Darmstadt]."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Deng, Y., and Meltzner, G. (2015, January 8\u201311). Pace independent mobile gait biometrics. Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA.","DOI":"10.1109\/BTAS.2015.7358784"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Muaaz, M., and Mayrhofer, R. (2013, January 2\u20134). An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers. Proceedings of the MoMM 2013: The 11th International Conference on Advances in Mobile Computing and Multimedia, Vienna, Austria.","DOI":"10.1145\/2536853.2536895"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TFUZZ.2019.2956896","article-title":"A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics","volume":"29","author":"Qin","year":"2021","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"ref_40","unstructured":"Stang, \u00d8. (2007). Gait Analysis: Is It Easy to Learn to Walk Like Someone Else?. [Master\u2019s Thesis, Norwegian University of Science and Technology]."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Mjaaland, B.B., Bours, P., and Gligoroski, D. (2010, January 25\u201328). Walk the walk: Attacking gait biometrics by imitation. Proceedings of the International Conference on Information Security, Boca Raton, FL, USA.","DOI":"10.1007\/978-3-642-18178-8_31"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Kumar, R., Phoha, V.V., and Jain, A. (2015, January 8\u201311). Treadmill attack on gait-based authentication systems. Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA.","DOI":"10.1109\/BTAS.2015.7358801"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1109\/TIFS.2016.2620278","article-title":"SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes","volume":"12","author":"Mohamed","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Negi, P., Sharma, P., Jain, V., and Bahmani, B. (2018, January 18\u201321). K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All. Proceedings of the NDSS, San Diego, CA, USA.","DOI":"10.14722\/ndss.2018.23303"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Mjaaland, B.B. (2010, January 18\u201319). The plateau: Imitation attack resistance of gait biometrics. Proceedings of the IFIP Working Conference on Policies and Research in Identity Management, Oslo, Norway.","DOI":"10.1007\/978-3-642-17303-5_8"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.patcog.2013.06.028","article-title":"The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication","volume":"47","author":"Ngo","year":"2014","journal-title":"Pattern Recognit."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/TMC.2014.2365185","article-title":"User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems","volume":"14","author":"Ren","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Fernandez-Lopez, P., Sanchez-Casanova, J., Liu-Jimenez, J., and Morcillo-Marin, C. (2017, January 23\u201326). Influence of walking in groups in gait recognition. Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain.","DOI":"10.1109\/CCST.2017.8167842"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Fernandez-Lopez, P., Kiyokawa, K., Wu, Y., and Liu-Jimenez, J. (2018, January 22\u201325). Influence of Walking Speed and Smartphone Position on Gait Recognition. Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, QC, Canada.","DOI":"10.1109\/CCST.2018.8585427"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"2555","DOI":"10.1109\/JSEN.2017.2786587","article-title":"Optimal Foot Location for Placing Wearable IMU Sensors and Automatic Feature Extraction for Gait Analysis","volume":"18","author":"Anwary","year":"2018","journal-title":"IEEE Sens. J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4711\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:37:37Z","timestamp":1760139457000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/13\/4711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":50,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2022,7]]}},"alternative-id":["s22134711"],"URL":"https:\/\/doi.org\/10.3390\/s22134711","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,6,22]]}}}