User authentication using keystroke dynamics for cellular phones
User authentication using keystroke dynamics for cellular phones
- Author(s): P. Campisi ; E. Maiorana ; M. Lo Bosco ; A. Neri
- DOI: 10.1049/iet-spr.2008.0171
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): P. Campisi 1 ; E. Maiorana 1 ; M. Lo Bosco 1 ; A. Neri 1
-
-
View affiliations
-
Affiliations:
1: Dip. Elettronica Applicata, Universitá degli Studi ‘Roma Tre’, Roma, Italy
-
Affiliations:
1: Dip. Elettronica Applicata, Universitá degli Studi ‘Roma Tre’, Roma, Italy
- Source:
Volume 3, Issue 4,
July 2009,
p.
333 – 341
DOI: 10.1049/iet-spr.2008.0171 , Print ISSN 1751-9675, Online ISSN 1751-9683
A new approach for keystroke-based authentication when using a cellular phone keypad as input device is presented. In the proposed method, users are authenticated using keystroke dynamics acquired when typing fixed alphabetic strings on a mobile phone keypad. The employed statistical classifier is able to perform user verification with an average equal error rate of about 13%. The obtained experimental results suggest that, when using mobile devices, a strong secure authentication scheme cannot rely on the sole keystroke dynamics, which however can be a module of a more complex system including, as basic security, a password-based protocol eventually hardened by keystroke analysis.
Inspec keywords: cellular radio; cryptography; protocols
Other keywords:
Subjects: Mobile radio systems; Protocols; Cryptography
References
-
-
1)
- R. Spillane . Keyboard apparatus for personal identification. IBM Tech. Discl. Bull. , 3346
-
2)
- A.A. Ross , K. Nandakumar , A.K. Jain . (2006) Handbook of multibiometrics.
-
3)
- H. Nonaka , M. Kurihara . Sensing pressure for authentication system using keystroke dynamics. Proc. World Acad. Sci. Eng. Technol. , 16 - 19
-
4)
- Adams, C.W.: `Legal requirements for the use of keystroke loggers', Proc. First Int. Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE05), 2005.
-
5)
- P. Kang , S. Park , S.-S. Hwang , H.-J. Lee , S. Cho . Improvement of keystroke data quality through artificial rhythms and cues. Comput. & Secur. , 3 - 11
-
6)
- N.L. Clarke , S.M. Furnell . Authentication mobile phone users using keystroke analysis. Int. J. Inf. Secur. , 6 , 1 - 14
-
7)
- F. Bergadano , D. Gunetti , C. Picardi . User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. , 3 , 911 - 915
-
8)
- J.D. Woodward . Biometrics: privacys foe or privacys friend?. Proc. IEEE , 9 , 1480 - 1492
-
9)
- Mäntyjärvi, J., Koivumäki, J., Vuori, P.: `Keystroke recognition for virtual keyboard', Proc. IEEE Int. Conf. Multimedia and Expo. 2002. (ICME'02), 2002, 2, p. 429–432.
-
10)
- A. Kholmatov , B. Yanikoglu . Identity authentication using improved online signature verification method. Pattern Recognit. Lett. , 15 , 2400 - 2408
-
11)
- N.L. Clarke , S.M. Furnell , P. Rodwell , P.L. Reynolds . Acceptance of subscriber authentication for mobile telephony devices. Comput. Secu. , 3 , 220 - 228
-
12)
- F. Monrose , A.D. Rubin . Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. , 4 , 351 - 359
-
13)
- Ogihara, A., Matsumura, H., Shiozaki, A.: `Biometric verification using keystroke motion and key press timing for ATM user authentication', Int. Symp. Intelligent Signal Processing and Communications 2006 (ISPACS' 06), p. 223–226.
-
14)
- J.A. Robinson , V.M. Liang , J.A.M. Chambers , C.L. MacKenzie . Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. A , 236 - 241
-
15)
- N.L. Clarke , S.M. Furnell , B.M. Lines , P.L. Reynolds . Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manage. Comput. Secur. , 4 , 161 - 166
-
16)
- S. Cho , S. Hwang . Artificial rhythms and cues for keystroke dynamics based authentication. Lecture notes in computer science , 626 - 632
-
17)
- L.C.F. Araújo , L.H.R. Sucupira , M.G. Lizarraga , L.L. Ling , J.B.T. Yabu-Uti . User authentication through typing biometrics features. IEEE Trans. Signal Process. , 2 , 851 - 855
-
18)
- Y. Sheng , V.V. Phoha , S.M. Rovnyak . A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst., Man Cybern. B , 4 , 826 - 833
-
19)
- Ahmad, F., Musilek, P.: `A keystroke and pointer control input interface for wearable computers', Proc. Fourth Annual IEEE Int. Conf. Pervasive Computing and Communications (PERCOM'06), 2006, p. 2–11.
-
20)
- R. Joyce , G. Gupta . Identity authorization based on keystroke latencies. Commun. ACM , 2 , 168 - 176
-
21)
- A. Peacock , X. Ke , M. Wilkerson . Typing patterns: a key to user identification. IEEE Secur. Priv. , 5 , 40 - 47
-
22)
- H.-J. Lee , S. Cho . Retraining a keystroke dynamics-based authenticator with impostor patterns. Comput. Secur. , 4 , 300 - 310
-
23)
- ITU E.161: ‘Arrangement of digits, letters and symbols on telephones and other devices that can be used for gaining access to a telephone network’, http://www.itu.int/rec/T-REC-E.161-200102-I/en.
-
24)
- A.K. Jain , P. Flynn , A.A. Ross . (2008) Handbook of biometrics.
-
25)
- M.D. Dunlop , M.M. Masters . Investigating five key predictive text entry with combined distance and keystroke modelling. Pers. Ubiquitous Comput. , 8 , 589 - 598
-
1)