Open Access iconOpen Access



Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

1 Department of Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia
2 Sensor Networks and Cellular Systems Research Center, University of Tabuk, Tabuk, 71491, Saudi Arabia

* Corresponding Author: Bandar Alotaibi. Email: email

Computers, Materials & Continua 2023, 75(1), 651-667.


Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric data to provide innovative user authentication solutions. This paper presents a new continuous passive authentication approach capable of learning the signatures of IoT users utilizing smartphone sensors such as a gyroscope, magnetometer, and accelerometer to recognize users by their physical activities. This approach integrates the convolutional neural network (CNN) and recurrent neural network (RNN) models to learn signatures of human activities from different users. A series of experiments are conducted using the MotionSense dataset to validate the effectiveness of the proposed method. Our technique offers a competitive verification accuracy equal to 98.4%. We compared the proposed method with several conventional machine learning and CNN models and found that our proposed model achieves higher identification accuracy than the recently developed verification systems. The high accuracy achieved by the proposed method proves its effectiveness in recognizing IoT users passively through their physical activity patterns.


Cite This Article

APA Style
Alzahrani, S., Alderaan, J., Alatawi, D., Alotaibi, B. (2023). Continuous mobile user authentication using a hybrid cnn-bi-lstm approach. Computers, Materials & Continua, 75(1), 651-667.
Vancouver Style
Alzahrani S, Alderaan J, Alatawi D, Alotaibi B. Continuous mobile user authentication using a hybrid cnn-bi-lstm approach. Comput Mater Contin. 2023;75(1):651-667
IEEE Style
S. Alzahrani, J. Alderaan, D. Alatawi, and B. Alotaibi "Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach," Comput. Mater. Contin., vol. 75, no. 1, pp. 651-667. 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 894


  • 555


  • 0


Share Link