{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:35:45Z","timestamp":1760232945827,"version":"build-2065373602"},"reference-count":31,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:00:00Z","timestamp":1670371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Development and verification of new methods of user authentication based on behavioral biometrics and machine learning methods","award":["POIR.01.01.01-00-0082\/20"],"award-info":[{"award-number":["POIR.01.01.01-00-0082\/20"]}]},{"name":"European Regional Development Fund","award":["POIR.01.01.01-00-0082\/20"],"award-info":[{"award-number":["POIR.01.01.01-00-0082\/20"]}]},{"name":"Statutory Research for Young Researchers funds","award":["POIR.01.01.01-00-0082\/20"],"award-info":[{"award-number":["POIR.01.01.01-00-0082\/20"]}]},{"name":"Faculty of Automatic Control, Electronics and Computer Science, Silesian University of Technology, Gliwice, Poland","award":["POIR.01.01.01-00-0082\/20"],"award-info":[{"award-number":["POIR.01.01.01-00-0082\/20"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cybersecurity companies from around the world use state-of-the-art technology to provide the best protection against malicious software. Recent times have seen behavioral biometry becoming one of the most popular and widely used components in MFA (Multi-Factor Authentication). The effectiveness and lack of impact on UX (User Experience) is making its popularity rapidly increase among branches in the area of confidential data handling, such as banking, insurance companies, the government, or the military. Although behavioral biometric methods show a high degree of protection against fraudsters, they are susceptible to the quality of input data. The selected behavioral biometrics are strongly dependent on mobile phone IMU sensors. This paper investigates the harmful effects of gaps in data on the behavioral biometry model\u2019s accuracy in order to propose suitable countermeasures for this issue.<\/jats:p>","DOI":"10.3390\/s22249580","type":"journal-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T05:50:52Z","timestamp":1670392252000},"page":"9580","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigation of the Impact of Damaged Smartphone Sensors\u2019 Readings on the Quality of Behavioral Biometric Models"],"prefix":"10.3390","volume":"22","author":[{"given":"Pawe\u0142","family":"Rybka","sequence":"first","affiliation":[{"name":"Digital Fingerprints, ul. \u017beliwna 38, 40-599 Katowice, Poland"}]},{"given":"Tomasz","family":"B\u0105k","sequence":"additional","affiliation":[{"name":"Digital Fingerprints, ul. \u017beliwna 38, 40-599 Katowice, Poland"}]},{"given":"Pawe\u0142","family":"Sobel","sequence":"additional","affiliation":[{"name":"Digital Fingerprints, ul. \u017beliwna 38, 40-599 Katowice, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1391-8809","authenticated-orcid":false,"given":"Damian","family":"Grzechca","sequence":"additional","affiliation":[{"name":"Faculty of Automatic Control, Electronics and Computer Science, Silesian University of Technology, ul. Akademicka 16, 44-100 Gliwice, Poland"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,7]]},"reference":[{"key":"ref_1","unstructured":"(2022, November 01). Internet Crime Report. Internet Crime Complaint Center (IC3), Available online: https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/3469886","article-title":"Human Factors in Phishing Attacks: A Systematic Literature Review","volume":"54","author":"Desolda","year":"2022","journal-title":"ACM Comput. Surv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"563060","DOI":"10.3389\/fcomp.2021.563060","article-title":"Phishing Attacks: A Recent Comprehensive Study and a New Anatomy","volume":"3","author":"Alkhalil","year":"2021","journal-title":"Front. Comput. Sci."},{"key":"ref_4","first-page":"539","article-title":"Employees\u2019 Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?","volume":"61","author":"Shahbaznezhad","year":"2021","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Aneke, J., Ardito, C., and Desolda, G. (2021, January 22\u201324). Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. Proceedings of the International Conference on Human-Computer Interaction, M\u00e1laga, Spain.","DOI":"10.1007\/978-3-030-77392-2_26"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Majumder, S., and Deen, M.J. (2019). Smartphone Sensors for Health Monitoring and Diagnosis. Sensors, 19.","DOI":"10.3390\/s19092164"},{"key":"ref_7","first-page":"321","article-title":"On the Consumption of Multimedia Content Using Mobile Devices: A Year to Year User Case Study","volume":"45","year":"2020","journal-title":"Arch. Acoust."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"408280","DOI":"10.1155\/2013\/408280","article-title":"A Survey of Keystroke Dynamics Biometrics","volume":"2013","author":"Teh","year":"2013","journal-title":"Sci. World J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics & continuous user authentication on mobile devices: A survey","volume":"66","author":"Stylios","year":"2021","journal-title":"Inf. Fusion"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sahdev, S.L., Singh, S., Kaur, N., and Siddiqui, L. (2021, January 17\u201319). Behavioral Biometrics for Adaptive Authentication in Digital Banking\u2014Guard Against Flawless Privacy. Proceedings of the 2021 International Conference on Innovative Practices in Technology and Management (ICIPTM), Noida, India.","DOI":"10.1109\/ICIPTM52218.2021.9388364"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Almalki, S., Assery, N., and Roy, K. (2021). An Empirical Evaluation of Online Continuous Authentication and Anomaly Detection Using Mouse Clickstream Data Analysis. Appl. Sci., 11.","DOI":"10.3390\/app11136083"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., and Koucheryavy, Y. (2018). Multi-Factor Authentication: A Survey. Cryptography, 2.","DOI":"10.3390\/cryptography2010001"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Chalhoub, G., Flechais, I., Nthala, N., Abu-Salma, R., and Tom, E. (2020, January 25\u201330). Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study. Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA.","DOI":"10.1145\/3334480.3382850"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Matsuoka, K., Irvan, M., Kobayashi, R., and Yamaguchi, R.S. (2020, January 16\u201318). A Score Fusion Method by Neural Network in Multi-Factor Authentication. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, Orleans, LA, USA.","DOI":"10.1145\/3374664.3379527"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Miyazawa, A., Thao, T.P., and Yamaguchi, R.S. (2022, January 8\u201311). Multi-factor Behavioral Authentication Using Correlations Enhanced by Neural Network-based Score Fusion. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700626"},{"key":"ref_16","first-page":"191","article-title":"Continuous Authentication in Mobile Devices Using Behavioral Biometrics","volume":"Volume 1006","author":"Novais","year":"2020","journal-title":"Proceedings of the Ambient Intelligence\u2014Software and Applications\u201410th International Symposium on Ambient Intelligence"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"109089","DOI":"10.1016\/j.patcog.2022.109089","article-title":"BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation","volume":"134","author":"Stragapede","year":"2023","journal-title":"Pattern Recognit."},{"key":"ref_18","first-page":"15","article-title":"Quality Expectations of Mobile Subscribers","volume":"1","year":"2015","journal-title":"J. Telecommun. Inf. Technol."},{"key":"ref_19","unstructured":"Chyzhevska, M., Romanovska, N., Ramskyi, A., Venger, V., and Obushnyi, M. (2021, January 26). Behavioral Biometry as a Cyber Security Tool. Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, Kyiv, Ukrain."},{"key":"ref_20","first-page":"116","article-title":"Android OS: A Review","volume":"4","year":"2015","journal-title":"Tem J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.procs.2019.08.172","article-title":"Features Importance in Classification Models for Colorectal Cancer Cases Phenotype in Indonesia","volume":"157","author":"Cenggoro","year":"2019","journal-title":"Procedia Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"104676","DOI":"10.1016\/j.compbiomed.2021.104676","article-title":"DNN-DTIs: Improved drug-target interactions prediction using XGBoost feature selection and deep neural network","volume":"136","author":"Chen","year":"2021","journal-title":"Comput. Biol. Med."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5549","DOI":"10.11591\/ijece.v11i6.pp5549-5557","article-title":"Company bankruptcy prediction framework based on the most influential features using XGBoost and stacking ensemble learning","volume":"11","author":"Muslim","year":"2021","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Putatunda, S., and Rama, K. (2018, January 28\u201330). A Comparative Analysis of Hyperopt as Against Other Approaches for Hyper-Parameter Optimization of XGBoost. Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, Shanghai, China.","DOI":"10.1145\/3297067.3297080"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/TCBB.2019.2911071","article-title":"XGBoost Model for Chronic Kidney Disease Diagnosis","volume":"17","author":"Ogunleye","year":"2020","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Dhaliwal, S.S., Nahid, A.-A., and Abbas, R. (2018). Effective Intrusion Detection System Using XGBoost. Information, 9.","DOI":"10.3390\/info9070149"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Jing, X., Zou, Q., Yan, J., Dong, Y., and Li, B. (2022). Remote Sensing Monitoring of Winter Wheat Stripe Rust Based on mRMR-XGBoost Algorithm. Remote Sens., 14.","DOI":"10.3390\/rs14030756"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sanders, W., Li, D., Li, W., and Fang, Z.N. (2022). Data-Driven Flood Alert System (FAS) Using Extreme Gradient Boosting (XGBoost) to Forecast Flood Stages. Water, 14.","DOI":"10.3390\/w14050747"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, H., Fei, Y., Liu, Y., Shen, L., Zhuang, Z., and Zhang, X. (2021). Research on the Prediction of Green Plum Acidity Based on Improved XGBoost. Sensors, 21.","DOI":"10.3390\/s21030930"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Shahbazi, Z., and Byun, Y.-C. (2022). Knowledge Discovery on Cryptocurrency Exchange Rate Prediction Using Machine Learning Pipelines. Sensors, 22.","DOI":"10.3390\/s22051740"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1504\/IJCAT.2020.106571","article-title":"Improved XGBoost model based on genetic algorithm","volume":"62","author":"Chen","year":"2020","journal-title":"Int. J. Comput. Appl. Technol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9580\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:35:32Z","timestamp":1760146532000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,7]]},"references-count":31,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["s22249580"],"URL":"https:\/\/doi.org\/10.3390\/s22249580","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,12,7]]}}}