Checking delivery availability...

Home All Updates (3681) IEEE 2016 ANDROID PR
IEEE 2016 ANDROID PROJECTS ABSTRACT: AUTHENTICATION OF SMARTPHONE USERS USING BEHAVIORAL BIOMETRICS ABSTRACT: Smart phones and tablets have become ubiquitous in our daily lives. Smart phones, in particular, have become more than personal assistants. These devices have provided new avenues for consumers to play, work and socialize whenever and wherever they want. Smart phones are small in size; so they are easy to handle and to stow and carry in users’ pockets or purses. However, mobile devices are also susceptible to various problems. One of the greatest concerns is the possibility of breach in security and privacy if the device is seized by an outside party. It is possible that threats can come from friends as well as strangers. Due to the size of smart devices, they can be easily lost and may expose details of users’ private lives. In addition, this might enable pervasive observation or imitation of one’s movements and activities, such as sending messages to contacts, accessing private communication, shopping with a credit card, and relaying information about where one has been. This paper highlights the potential risks that occur when smart phones are stolen or seized, discusses the concept of continuous authentication, and analyzes current approaches and mechanisms of behavioral biometrics with respect to methodology, associated datasets and evaluation approaches. EXISTING SYSTEM: Smart phones provide substantial personal benefits for users every day. Many people have come to rely on smart phones for many common, personal and work-related communication tasks. Most users tend to store their passwords and private information on smart phones to efficiently perform these operations in a hassle-free manner. Consequently, potential threats to the accounts of owners have increased tremendously. With the vast popularity of smart phones, privacy and security issues have become paramount. Due to the size of smart phones, they are quite prone to potentially being lost, stolen, or accessed easily by non-owners. Once an intruder has physical access to a device, he/she may be able to impersonate the original owner of the device for monetary or non-monetary gains and miss chiefs; thus, smart phones are much more susceptible to theft than desktops . Attackers are likely to access Online Social Networks. financial application and other applications on stolen devices PROPOSED SYSTEM: In this paper, we focus on comprehensively summarizing the state-of-the-art in improving a smart phone’s security based on continuous authentication using behavioral biometrics. Behavioral biometrics, as defined in III-B, use behavioral traits of a subject like how one touches screen, walks, talks, signs a signature, and types to identify a subject. Each subject is expected to differ from all others when analyzed using one or more of these features. In the following sections, we discuss in depth four types: keystroke, touch screen behavior, gait and hand waving, and also introduce other types such as voice, A powerful argument for behavioral biometrics is that it can assist in continuous and passive authentication without requiring additional hardware. As a result, behavioral authentication is likely to be cheaper has using physiological biometrics. In the following sections, we will discuss several examples of behavioral biometrics. These are based on touch screen behavior, gait, keystroke, hand waving, voice, profiling and signature. SYSTEM SPECIFICATION: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 14’ Colour Monitor.  Mouse : Optical Mouse.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows 7 Ultimate.  Coding Language : Java. Front-End : Eclipse.  Data Base : SQLite Manger. CONCLUSION: The growing number of users of smart device is resulting in an increasing amount of private information being stored inside each such devices. Numerous problems in security and privacy are constantly being raised. To resolve these issues, researchers have implemented many methods including continuous authentication approaches based on user behavior. This paper has discussed and compared a number of existing solutions from several perspectives. New methods must focus on multiple characteristics and secure against a variety of attacks, while making the security system easy to use and adapted to each owner. In addition to the methods discussed above, a promising approach may be to measure user behavior in terms of application usage. Each smart phone contains applications which can be used for various purposes. Therefore, making continuous authentication based on application usage can be one way to enhance security and privacy. For example, applications can be categorized into social applications
  • 2016-11-03T08:32:12

Other Updates

View All Updates