
(Maghsoudi, 2016) it is shown how hand movement 
analysis  can  be  used  in  user  identification.  All 
necessary data  was  collected by built-in sensors of 
the  smartphone.  In  this  case  there  is  no  need  user 
entering  anything,  all  necessary  authentication 
information  is  being  collected  while  user’s  hand 
with  a  phone  is  moving  towards  user’s  ear.  That’s 
why an authentication method without any extra user 
actions can be suggested providing authentication of 
a person answering an incoming call. 
The problem of incoming call authentication was 
considered  in  (Conti,  2011).  In  this  paper,  the 
researchers  proposed  to  replace  the  input  of  the 
password  with  the  characteristics  of  the  hand 
movement when answering an incoming call. Data, 
as  in  previous  works,  was  obtained  from  built-in 
sensors (accelerometer and orientation sensor). For 
user  authentication,  Dynamic  Time  Warping 
Distance  and  Dynamic  Time  Warping  Similarity 
algorithms  were  used.  The  basic  idea  of  this 
approach  is  to  obtain  the  distance  between  the 
coordinates  of  the  vector  of  characteristics  of  the 
legitimate user and the coordinates of such vectors 
of  the  user  in  relation  to  which  authentication  is 
performed. The closer the vector of the current user 
to  the  legal  user's  vector,  the  more  likely  he  is  a 
legitimate  user.  This  approach  is  notable  for  its 
simplicity. Using the training sample of 10 people’s 
50 lifts of the phone, the system missed the attacker 
in 4.4% of cases, and the legal user was blocked in 
9.3%  of  cases.  These  study  shows  that  the 
movement of the hand when answering an incoming 
call is unique for each person. 
In (Buriro, 2017), a user authentication method 
based  on  the  "micromovements"  of  his  hand  right 
after unlocking the smartphone on the Android OS is 
presented.  To  receive  data,  built-in  smartphone 
sensors  (accelerometer,  gyroscope,  magnetometer, 
gravity  sensor  and  orientation  sensor)  are  used.  In 
addition, a low-pass filter and a high-pass filter are 
applied to the data obtained from the accelerometer. 
Thus, 7 data sources are used. The data acquisition 
process  starts  immediately  after  receiving  the 
USER_PRESENT event at intervals of 2, 4, 6, 8 and 
10  seconds.  Then  the  following  features  were 
calculated: 
▪  mean; 
▪  mean absolute deviation; 
▪  median; 
▪  standard error of the mean; 
▪  standard deviation; 
▪  skewness; 
▪  kurtosis. 
After  this,  feature  vectors  were  formed,  which 
were  fed  to  the  input  of  various  algorithms  of 
machine  learning.  It  is  worth  noting  that  in  this 
paper the task of user identification was considered, 
so, the classification problem was solved using the 
machine learning algorithm. The authors gained the 
following  results:  in  96%  of  cases  the  system 
correctly  identified  the  user  using  the  Random 
Forest algorithm. 
3  DATA ACQUISITION AND 
FEATURE SELECTION 
The analysis showed that the movement of the hand 
when answering an incoming call is unique for each 
person and the information about this movement can 
be used for user authentication. To perform it, it is 
necessary  to  obtain  data  from  the  sensors  of  the 
mobile phone, pre-process it and select features for 
learning the algorithm. 
3.1  First Look at the Problem 
The problem of a mobile phone user authentication 
when answering an incoming call has several limits 
and speciality: 
▪  limited time to perform authentication (having 
no  answer,  the  caller  will  simply  "drop"  the 
call); 
▪  limited operational memory of the device; 
▪  the  method  used  must  be  simple  and  user-
friendly. 
Based on these limits, a method of authentication 
based  on  behavioural  biometrics  was  proposed,  in 
which  the  user  would  not  need  to  perform  any 
additional  actions,  except  for  placing  the  phone  to 
his ear,  as  he  usually does answering an incoming 
call. This action becomes a source of the behavioural 
biometrics data of the user. 
We would like to focus your attention on the fact 
that  only  standard  sensors  (gyroscope, 
accelerometer, touch screen) are needed, and most of 
modern  smartphones  are  equipped  with  these 
sensors. 
3.2  Sensors Used and Data Obtained 
In order to describe the movement of the phone in 
space, it is necessary to obtain data from the sensors 
of the phone. An event is generated in the Android 
OS  when  a  state  of  any  sensor  is  changed. 
According  to  the  Android  documentation,  each 
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
26