Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
SENTINEL-DL: a forensic framework for device attribution using motion sensor data
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 29 January 2026

SENTINEL-DL: a forensic framework for device attribution using motion sensor data

  • Attaullah Buriro1,
  • Abdul Baseer Buriro2,
  • Tahir Ahmad3,
  • Flaminia Luccio4,
  • Muhammad Azfar Yaqub5 &
  • …
  • Markus Zanker5,6 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Computer science
  • Electrical and electronic engineering
  • Information technology

Abstract

This paper introduces SENTINEL-DL-a novel forensic framework which leverages accelerometer sensory data to associate motion-based digital evidence to its corresponding smartphone or smartwatch models. SENTINEL-DL analyzes robust tamper-resistant intrinsic motion signatures (profiled using built-in 3D accelerometers) to establish device associations. Technically speaking, it leverages small differences in linear acceleration to identify and associate the readings with its generating device. SENTINEL-DL utilizes machine learning models including random forest (RF), deep neural networks (DNN) and convolutional neural networks (CNN) to drive its association during the matching process, i.e., unknown sensory data against a reference database containing device profiles from known sources. The results of empirical tests show that SENTINEL-DL for smartphones and smartwatches, respectively, achieves a true positive rate (TPR) of 93.99% and 92.65%, a false acceptance rate (FAR) of 0.66% and 1.22%, and an overall accuracy of 98.76% and 98.97%. SENTINEL-DL being light-weight promises investigators a dependable analysis solution for motion sensor evidence while providing digital fingerprinting capabilities and forensic authentication support. The research demonstrates how motion sensor data can be utilized in digital forensic investigations to develop improved device fingerprinting and forensic verification methodologies.

Similar content being viewed by others

A physics-based fingerprinting approach for efficient device identification in OWC system

Article Open access 26 September 2025

Evaluation of deep learning models in contactless human motion detection system for next generation healthcare

Article Open access 14 December 2022

An improved human activity recognition technique based on convolutional neural network

Article Open access 19 December 2023

Data availability

The dataset Heterogeneity Dataset for Human Activity Recognition from Smartphones and Smartwatches used in this study is publicly available25. However, the processed version of the data used for training and evaluation in the current research is available from the corresponding author upon reasonable request.

References

  1. Majumder, S. & Deen, M. J. Smartphone sensors for health monitoring and diagnosis. Sensors 19(9), 2164 (2019).

    Google Scholar 

  2. King, C. E. & Sarrafzadeh, M. A survey of smartwatches in remote health monitoring. J. Healthcare Inf. Res. 2, 1–24 (2018).

    Google Scholar 

  3. Bernardo, J. B. L., Taparugssanagorn, A., Miyazaki, H., Pati, B. M. & Thapa, U. Robust human activity recognition for intelligent transportation systems using smartphone sensors: A position-independent approach. Appl. Sci. 14(22), 10461 (2024).

    Google Scholar 

  4. Lin, L. et al. LIMUNet: A lightweight neural network for human activity recognition using smartwatches. Appl. Sci. 14(22), 10515 (2024).

    Google Scholar 

  5. Ahad, M. A. R. et al. Wearable sensor-based gait analysis for age and gender estimation. Sensors 20(8), 2424 (2020).

    Google Scholar 

  6. Davarci, E., Soysal, B., Erguler, I., Aydin, S. O., Dincer, O. & Anarim, E. Age group detection using smartphone motion sensors. In 2017 25th European Signal Processing Conference (EUSIPCO), 2201–2205 (IEEE, 2017).

  7. Buriro, A. Behavioral biometrics for smartphone user authentication. Ph.D. thesis, University of Trento (2017).

  8. Buriro, A., Akhtar, Z., Ricci, F. & Luccio, F. Wearable wisdom: A Bi-modal behavioral biometric scheme for smartwatch user authentication. IEEE Access, (2024).

  9. MOBILedit. Smartwatch Forensics—Extracting and Analyzing Data from Smartwatches. Available at: https://www.mobiledit.com/smartwatch-forensics (Accessed: 2024–02–06).

  10. Azfar, A., Choo, K.-K. R. & Liu, L. Forensic taxonomy of popular Android mHealth apps. arXiv preprint arXiv:1505.02905 (2015).

  11. Jeon, S., Chung, J. & Jeong, D. Watch Out! Smartwatches as criminal tool and digital forensic investigations. arXiv preprint arXiv:2308.09092 (2023).

  12. Lin, H. Attribution of malicious cyber incidents: From soup to nuts. J. Int. Aff. 70(1), 75–137 (2016).

    Google Scholar 

  13. Martin, J., Mayberry, T., Donahue, C., Foppe, L., Brown, L., Riggins, C., Rye, E. C., & Brown, D. A study of MAC address randomization in mobile devices and when it fails. arXiv preprint arXiv:1703.02874 (2017).

  14. Kumar, K., Kaur, P. & Amritsar, G. N. D. U. Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number. Int. J. Comput. Sci. Mob. Comput. 4(5), 527–533 (2015).

    Google Scholar 

  15. Alotaibi, B. & Elleithy, K. A new MAC address spoofing detection technique based on random forests. Sensors 16(3), 281 (2016).

    Google Scholar 

  16. Xie, T., Tu, G.-H., Li, C.-Y. & Peng, C. How can IoT services pose new security threats in operational cellular networks?. IEEE Trans. Mob. Comput. 20(8), 2592–2606 (2020).

    Google Scholar 

  17. Hoque, N., & Rahbari, H. Countering relay and spoofing attacks in the connection establishment phase of Wi-Fi systems. Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 275–285 (2023).

  18. Bojinov, H., Michalevsky, Y., Nakibly, G., & Boneh, D. Mobile device identification via sensor fingerprinting. arXiv preprint arXiv:1408.1416 (2014).

  19. Baldini, G., Steri, G., Amerini, I., & Caldelli, R. The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints. In 2017 International Carnahan Conference on Security Technology (ICCST), 1–6 (2017).

  20. Moubarak, N. N. I., Omar, N. M. M. & Youssef, V. N. Smartphone-sensor-based human activities classification for forensics: A machine learning approach. J. Electr. Syst. Inf. Technol. 11(1), 33 (2024).

    Google Scholar 

  21. Ahmed, T., Arefin, S., Parvez, R., Jahin, F., Sumaiya, F., & Hasan, M. Advancing mobile sensor data authentication: Application of deep machine learning models. In 2024 IEEE International Conference on Electro Information Technology (eIT), 538–544 (2024).

  22. Baldini, G., Steri, G., Dimc, F., Giuliani, R. & Kamnik, R. Experimental identification of smartphones using fingerprints of built-in micro-electro mechanical systems (MEMS). Sensors 16(6), 818 (2016).

    Google Scholar 

  23. Aweya, J. Designing switch/routers: Fundamental concepts and design methods. CRC Press (2022).

  24. Marabissi, D., Mucchi, L. & Stomaci, A. IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet 14(2), 61 (2022).

    Google Scholar 

  25. Blunck, H., Bhattacharya, S., Prentow, T., Kjrgaard, M. & Dey, A. Heterogeneity activity recognition, UCI machine learning repository, Available at: https://archive.ics.uci.edu/dataset/344/heterogeneity+activity+recognition (2015)

  26. Stisen, A., Blunck, H., Bhattacharya, S., Prentow, T. S., Kjærgaard, M. B., Dey, A., Sonne, T., & Jensen, M. M. Smart devices are different: Assessing and mitigating mobile sensing heterogeneities for activity recognition. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 127–140 (2015).

  27. Mills, A. et al. Efficient and interpretable real-time malware detection using random-forest. In 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), 1–8 (2019).

  28. Louk, M. H. L. & Tama, B. A. Tree-based classifier ensembles for PE malware analysis: A performance revisit. Algorithms 15(9), 332 (2022).

    Google Scholar 

  29. Buriro, A. et al. MalwD&C: A quick and accurate machine learning-based approach for malware detection and categorization. Appl. Sci. 13(4), 2508 (2023).

    Google Scholar 

  30. Buriro, A., Luccio, F., Costa, G., Focardi, R., et al. Z-MDZS: Zero-day Malware Detection using Zero-Shot Machine Learning Schemes. In IEEE Consumer Communications & Networking Conference (2024).

Download references

Funding

The authors received no funding for this work.

Author information

Authors and Affiliations

  1. School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK

    Attaullah Buriro

  2. Department of Electrical Engineering, Sukkur IBA University, Sukkur, Pakistan

    Abdul Baseer Buriro

  3. Security and Trust Center, Fondazione Bruno Kessler (FBK), Trento, Italy

    Tahir Ahmad

  4. Department of Environmental Sciences, Informatics and Statistics, Ca’ Foscari University of Venice, Venice, Italy

    Flaminia Luccio

  5. Faculty of Engineering, Free University of Bolzano, Bolzano, Italy

    Muhammad Azfar Yaqub & Markus Zanker

  6. University of Klagenfurt, Klagenfurt, Austria

    Markus Zanker

Authors
  1. Attaullah Buriro
    View author publications

    Search author on:PubMed Google Scholar

  2. Abdul Baseer Buriro
    View author publications

    Search author on:PubMed Google Scholar

  3. Tahir Ahmad
    View author publications

    Search author on:PubMed Google Scholar

  4. Flaminia Luccio
    View author publications

    Search author on:PubMed Google Scholar

  5. Muhammad Azfar Yaqub
    View author publications

    Search author on:PubMed Google Scholar

  6. Markus Zanker
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Attaullah Buriro, Abdul Baseer, Tahir Ahmad, Muhammad Azfar Yaqub, Conceptualization, Methodology, Software, Data Curation, Writing—Original Draft. Flaminia Luccio, Markus Zanker: Supervision, Project Administration, Writing—Review and Editing. Flaminia Luccio, Markus Zanker: Investigation, Validation, Resources, Writing—Review and Editing.

Corresponding authors

Correspondence to Attaullah Buriro or Tahir Ahmad.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Buriro, A., Buriro, A.B., Ahmad, T. et al. SENTINEL-DL: a forensic framework for device attribution using motion sensor data. Sci Rep (2026). https://doi.org/10.1038/s41598-025-34734-5

Download citation

  • Received: 21 June 2025

  • Accepted: 30 December 2025

  • Published: 29 January 2026

  • DOI: https://doi.org/10.1038/s41598-025-34734-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on Twitter
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics