Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

User authentication using keystroke dynamics for cellular phones

User authentication using keystroke dynamics for cellular phones

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Signal Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A new approach for keystroke-based authentication when using a cellular phone keypad as input device is presented. In the proposed method, users are authenticated using keystroke dynamics acquired when typing fixed alphabetic strings on a mobile phone keypad. The employed statistical classifier is able to perform user verification with an average equal error rate of about 13%. The obtained experimental results suggest that, when using mobile devices, a strong secure authentication scheme cannot rely on the sole keystroke dynamics, which however can be a module of a more complex system including, as basic security, a password-based protocol eventually hardened by keystroke analysis.

References

    1. 1)
      • R. Spillane . Keyboard apparatus for personal identification. IBM Tech. Discl. Bull. , 3346
    2. 2)
      • A.A. Ross , K. Nandakumar , A.K. Jain . (2006) Handbook of multibiometrics.
    3. 3)
      • H. Nonaka , M. Kurihara . Sensing pressure for authentication system using keystroke dynamics. Proc. World Acad. Sci. Eng. Technol. , 16 - 19
    4. 4)
      • Adams, C.W.: `Legal requirements for the use of keystroke loggers', Proc. First Int. Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE05), 2005.
    5. 5)
      • P. Kang , S. Park , S.-S. Hwang , H.-J. Lee , S. Cho . Improvement of keystroke data quality through artificial rhythms and cues. Comput. & Secur. , 3 - 11
    6. 6)
      • N.L. Clarke , S.M. Furnell . Authentication mobile phone users using keystroke analysis. Int. J. Inf. Secur. , 6 , 1 - 14
    7. 7)
      • F. Bergadano , D. Gunetti , C. Picardi . User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. , 3 , 911 - 915
    8. 8)
      • J.D. Woodward . Biometrics: privacys foe or privacys friend?. Proc. IEEE , 9 , 1480 - 1492
    9. 9)
      • Mäntyjärvi, J., Koivumäki, J., Vuori, P.: `Keystroke recognition for virtual keyboard', Proc. IEEE Int. Conf. Multimedia and Expo. 2002. (ICME'02), 2002, 2, p. 429–432.
    10. 10)
      • A. Kholmatov , B. Yanikoglu . Identity authentication using improved online signature verification method. Pattern Recognit. Lett. , 15 , 2400 - 2408
    11. 11)
      • N.L. Clarke , S.M. Furnell , P. Rodwell , P.L. Reynolds . Acceptance of subscriber authentication for mobile telephony devices. Comput. Secu. , 3 , 220 - 228
    12. 12)
      • F. Monrose , A.D. Rubin . Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. , 4 , 351 - 359
    13. 13)
      • Ogihara, A., Matsumura, H., Shiozaki, A.: `Biometric verification using keystroke motion and key press timing for ATM user authentication', Int. Symp. Intelligent Signal Processing and Communications 2006 (ISPACS' 06), p. 223–226.
    14. 14)
      • J.A. Robinson , V.M. Liang , J.A.M. Chambers , C.L. MacKenzie . Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. A , 236 - 241
    15. 15)
      • N.L. Clarke , S.M. Furnell , B.M. Lines , P.L. Reynolds . Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manage. Comput. Secur. , 4 , 161 - 166
    16. 16)
      • S. Cho , S. Hwang . Artificial rhythms and cues for keystroke dynamics based authentication. Lecture notes in computer science , 626 - 632
    17. 17)
      • L.C.F. Araújo , L.H.R. Sucupira , M.G. Lizarraga , L.L. Ling , J.B.T. Yabu-Uti . User authentication through typing biometrics features. IEEE Trans. Signal Process. , 2 , 851 - 855
    18. 18)
      • Y. Sheng , V.V. Phoha , S.M. Rovnyak . A parallel decision tree-based method for user authentication based on keystroke patterns. IEEE Trans. Syst., Man Cybern. B , 4 , 826 - 833
    19. 19)
      • Ahmad, F., Musilek, P.: `A keystroke and pointer control input interface for wearable computers', Proc. Fourth Annual IEEE Int. Conf. Pervasive Computing and Communications (PERCOM'06), 2006, p. 2–11.
    20. 20)
      • R. Joyce , G. Gupta . Identity authorization based on keystroke latencies. Commun. ACM , 2 , 168 - 176
    21. 21)
      • A. Peacock , X. Ke , M. Wilkerson . Typing patterns: a key to user identification. IEEE Secur. Priv. , 5 , 40 - 47
    22. 22)
      • H.-J. Lee , S. Cho . Retraining a keystroke dynamics-based authenticator with impostor patterns. Comput. Secur. , 4 , 300 - 310
    23. 23)
      • ITU E.161: ‘Arrangement of digits, letters and symbols on telephones and other devices that can be used for gaining access to a telephone network’, http://www.itu.int/rec/T-REC-E.161-200102-I/en.
    24. 24)
      • A.K. Jain , P. Flynn , A.A. Ross . (2008) Handbook of biometrics.
    25. 25)
      • M.D. Dunlop , M.M. Masters . Investigating five key predictive text entry with combined distance and keystroke modelling. Pers. Ubiquitous Comput. , 8 , 589 - 598
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-spr.2008.0171
Loading

Related content

content/journals/10.1049/iet-spr.2008.0171
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address