Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities

Wenjuan Li, Weizhi Meng, Steven Furnell

Research output: Journal article publicationJournal articleAcademic researchpeer-review

13 Citations (Scopus)


The Internet of Things (IoT) allows various embedded devices and smart sensors to be connected with each other, which provides a basis for building smart cities. The IoT-enabled smart city can greatly benefit people's daily lives, where smartphone is one of the most widely used IoT devices. For example, people can use the phone to check their financial account, store personal data and communicate with peers. Thus it is very important to safeguard the phones from unauthorized access. To complement traditional textual passwords, touch behavioral authentication has attracted much attention while it is still a challenge on how to build a robust scheme in practice. This is because users’ touch actions are often dynamic and hard to model. For this challenge, previous work has proved that touch actions could become consistent when users interact with social networking applications. Motivated by this observation, in this work, we perform a study to investigate users’ touch behavior within Email applications on smartphones (with Email being one of the most important and widely used means in connecting with others). The study results with 60 participants validate the former observation that users’ touch behavioral deviation can be greatly decreased when they play Email applications.

Original languageEnglish
Pages (from-to)35-41
Number of pages7
JournalPattern Recognition Letters
Publication statusPublished - Apr 2021
Externally publishedYes


  • Behavioral user authentication
  • Machine learning
  • Smartphone security
  • Social networking
  • Touch gestures
  • Usable security

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Computer Vision and Pattern Recognition
  • Artificial Intelligence


Dive into the research topics of 'Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities'. Together they form a unique fingerprint.

Cite this