Authentication of smartphone user using RSSI geolocation
Nguyen, Vincent K.
MetadataShow full item record
This thesis attempts to authenticate a smartphone user by pattern of life based on a smartphone user's geolocation throughout the course of a day. Current smartphone technology uses the global positioning system (GPS) as the primary source for geolocation because of its accuracy. However, services such as Google Location Service and Skyhook use Receive Signal Strength Indicator (RSSI)-based geolocation in GPS-degraded environments, such as inside a building. By using a smartphone's Wi-Fi application programming interface, a smartphone would detect all wireless access points' Wi-Fi signals and associated signal strength over a discrete time interval. A hidden Markov model is used to model various smartphone users and used as an authentication method. The resulting f-score from the experiments ranged between 0.76 and 0.80, which is well above the 0.20 baseline. It is feasible to use RSSI-based geolocation as an element in combination with other methods to continuously authenticate a smartphone user. For an acceptable authentication method, the evaluation criteria must be as close to 1.0 as possible. Future research could combine authentication from RSSI-based geolocation with gait and keystroke analysis to improve results by leveraging other sensors on a smartphone.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Woodman, Daniel Glenn (Monterey, California: Naval Postgraduate School, 2016-03);Despite significant research, the challenge of mapping the physical topology of large networks remains a relatively unsolved problem. Although it possesses numerous ramifications for Internet security and resiliency, ...
Fleming, Samuel B. (Monterey, California: Naval Postgraduate School, 2014-03);Keystroke analysis has been an accepted method for user identification and authentication since the early 1980s. Most of the research in this field of biometrics has focused on traditional computer keyboards, with very few ...
Williford, Bradley John (Monterey, California. Naval Postgraduate School, 2012-03);Highly mobile, maneuver units require the ability to rapidly provide perimeter defense for their assets. Remote sensors, combined with wireless networks and Smartphones offer a means to reduce manpower impacts of perimeter ...