Game authentication based on behavior pattern

Noureldin Ali, Linda Yang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    357 Downloads (Pure)

    Abstract

    Nowadays smartphones have gained a huge popularity, ranging from using social applications to play video games. Smartphones also became more private than before. Although security mechanisms are provided from different smartphone providers, still smartphones are vulnerable to getting attacks regularly. Therefore, a security mechanism can help in protecting the smartphone from attackers. We propose a security mechanism that can help in protecting smartphone while at the same time enjoy using it such as playing a video game. The authentication system is designed in a way that can read raw data directly from the touch sensor so, it’s not bound to be used in a particular application. Our system authenticates the user in the background without interrupting the user interaction with the smartphone. We tested the system in a real environment with two popular games. We managed to get 70% accuracy in one game and 90% in the other game.
    Original languageEnglish
    Title of host publicationMoMM2017: Proceedings of The 15th International Conference on Advances in Mobile Computing & Multimedia
    PublisherAssociation for Computing Machinery (ACM)
    Pages151-156
    Number of pages6
    ISBN (Print)978-1450353007
    DOIs
    Publication statusPublished - 4 Dec 2017
    Event15th International Conference on Advances in Mobile Computing & Multimedia - Salzburg, Austria
    Duration: 4 Dec 20176 Dec 2017
    http://www.iiwas.org/conferences/momm2017/

    Conference

    Conference15th International Conference on Advances in Mobile Computing & Multimedia
    Abbreviated titleMoMM 2017
    Country/TerritoryAustria
    CitySalzburg
    Period4/12/176/12/17
    Internet address

    Keywords

    • mobile devices
    • authentication
    • android
    • grid
    • sensor
    • gesture
    • biometric

    Fingerprint

    Dive into the research topics of 'Game authentication based on behavior pattern'. Together they form a unique fingerprint.

    Cite this