Open Access
ARTICLE
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
1 Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, 518052, China
2 Sangfor Technologies Inc., Shenzhen, 518055, China
3 School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, China
4 College of Computer Science & Technology, Zhejiang University of Technology, Hangzhou, 310023, China
5 Software Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh, 12372, Saudi Arabia
6 Math & Computer Science Department, Faculty of Science, Menofia University, Shebin El-Kom, Egypt
7 Computing Science Department, University of Aberdeen, Aberdeen, UK
* Corresponding Author: Zhengqiu Weng. Email:
(This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
Computer Modeling in Engineering & Sciences 2024, 138(3), 3013-3032. https://doi.org/10.32604/cmes.2023.031088
Received 13 May 2023; Accepted 10 August 2023; Issue published 15 December 2023
Abstract
With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly includes: (1) Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication, reduce the probability of the model being bypassed by attackers, and reduce the overhead of data centralized processing and the risk of privacy leakage; (2) Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation; (3) Combine Variational Mode Decomposition (VMD) and Long Short-Term Memory (LSTM) to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification. The experimental results on the real environment dataset of 1513 people show that the method proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.