Mohamed Meselhy Eltoukhy
ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques
Eltoukhy, Mohamed Meselhy; Gaber, Tarek; Almazroi, Abdulwahab Ali; Mohamed, Marwa F.
Authors
Tarek Gaber
Abdulwahab Ali Almazroi
Marwa F. Mohamed
Abstract
This study focuses on addressing computational limits in smartphones by proposing an efficient authentication model that enables implicit authentication without requiring additional hardware and incurring less computational cost. The research explores various wrapper feature selection strategies and classifiers to enhance authentication accuracy while considering smartphone limitations such as hardware constraints, battery life, and memory size. However, the available dataset is small; thus, it cannot support a general conclusion. In this article, a novel implicit authentication model for smartphone users is proposed to address the one-against-all classification problem in smartphone authentication. This model depends on the integration of the conditional tabular generative adversarial network (CTGAN) to generate synthetic data to address the imbalanced dataset and a new proposed feature selection technique based on the Whale Optimization Algorithm (WOA). The model was evaluated using a public dataset (RHU touch mobile keystroke dataset), and the results showed that the WOA with the random forest (RF) classifier achieved the best reduction rate compared to the Harris Hawks Optimization (HHO) algorithm. Additionally, its classification accuracy was found to be the best in mobile user authentication from their touch behavior data. WOA-RF achieved an average accuracy of 99.62 ± 0.40% with a reduction rate averaging 87.85% across ten users, demonstrating its effectiveness in smartphone authentication.
Citation
Eltoukhy, M. M., Gaber, T., Almazroi, A. A., & Mohamed, M. F. (in press). ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Computer Science, 10, e2001. https://doi.org/10.7717/peerj-cs.2001
Journal Article Type | Article |
---|---|
Acceptance Date | Mar 28, 2024 |
Online Publication Date | Apr 29, 2024 |
Deposit Date | May 21, 2024 |
Publicly Available Date | May 21, 2024 |
Journal | PeerJ Computer Science |
Publisher | PeerJ |
Peer Reviewed | Peer Reviewed |
Volume | 10 |
Pages | e2001 |
DOI | https://doi.org/10.7717/peerj-cs.2001 |
Files
Published Version
(2.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Deep churn prediction method for telecommunication industry
(2023)
Journal Article
Optimized and efficient image-based IoT malware detection method
(2023)
Journal Article
Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey
(2022)
Journal Article
A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms
(2022)
Journal Article