A parameterized model to select discriminating features on keystroke dynamics authentication on smartphones

被引:10
|
作者
Lee, Hyungu [1 ]
Hwang, Jung Yeon [2 ]
Lee, Shincheol [1 ]
Kim, Dong In [1 ]
Lee, Sung-Hoon [3 ]
Lee, Jaehwan [4 ]
Shin, Ji Sun [1 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Elect & Telecommun Res Inst, Daejeon, South Korea
[3] Univ Sci & Technol, Daejeon, South Korea
[4] Korea Aerosp Univ, Sch Elect & Informat Engn, Goyang City, South Korea
关键词
Keystroke dynamics authentication; Edge devices; Smartphones; IoT; Machine learning; VERIFICATION;
D O I
10.1016/j.pmcj.2019.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, smartphones work not only as personal devices, but also as distributed IoT edge devices uploading information to a cloud. Their secure authentications become more crucial as information from them can spread wider. Keystroke dynamics is one of prominent candidates for authentications factors. Combined with PIN/pattern authentications, keystroke dynamics provide a user-friendly multi-factor authentication for smartphones and other IoT devices equipped with keypads and touch screens. There have been many studies and researches on keystroke dynamics authentication with various features and machine-learning classification methods. However, most of researches extract the same features for the entire user and the features used to learn and authenticate the user's keystroke dynamics pattern. Since the same feature is used for all users, it may include features that express the users' keystroke dynamics well and those that do not. The authentication performance may be deteriorated because only the discriminative feature capable of expressing the keystroke dynamics pattern of the user is not selected. In this paper, we propose a parameterized model that can select the most discriminating features for each user. The proposed technique can select feature types that better represent the user's keystroke dynamics pattern using only the normal user's collected samples. In addition, performance evaluation in previous studies focuses on average EER(equal error rate) for all users. EER is the value at the midpoint between the FAR(false acceptance rate) and FRR(false rejection rate), FAR is the measure of security, and FRR is the measure of usability. The lower the FAR, the higher the authentication strength of keystroke dynamics. Therefore, the performance evaluation is based on the FAR. Experimental results show that the FRR of the proposed scheme is improved by at least 10.791% from the maximum of 31.221% compared with the other schemes. (C) 2019 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:45 / 57
页数:13
相关论文
共 50 条
  • [21] User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal
    Di Tommaso, Fabio
    Guerra, Michele
    Martinelli, Fabio
    Mercaldo, Francesco
    Piedimonte, Massimo
    Rosa, Giovanni
    Santone, Antonella
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 6232 - 6234
  • [22] Hybrid Model with Fusion Approach to Enhance the Efficiency of Keystroke Dynamics Authentication
    Thanganayagam, Ramu
    Thangadurai, Arivoli
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 85 - 96
  • [23] Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics`
    Kumar, T. Senthil
    Suresh, Abhijit
    Karumathil, Aadarsh
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 885 - 893
  • [24] The Impact of Database Quality on Keystroke Dynamics Authentication
    Panasiuk, Piotr
    Rybnik, Mariusz
    Saeed, Khalid
    Rogowski, Marcin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
  • [25] Two novel biometric features in keystroke dynamics authentication systems for touch screen devices
    Tasia, Cheng-Jung
    Chang, Ting-Yi
    Cheng, Pei-Cheng
    Lin, Jyun-Hao
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (04) : 750 - 758
  • [26] Keystroke Dynamics Authentication in Cloud Computing: A Survey
    Hassan, Basma Mohammed
    Fouad, Khaled Mohammed
    Hassan, Mahmoud Fathy
    INTERNATIONAL JOURNAL OF ENTERPRISE INFORMATION SYSTEMS, 2015, 11 (04) : 99 - 120
  • [27] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49
  • [28] The reliability of user authentication through keystroke dynamics
    Douhou, Salima
    Magnus, Jan R.
    STATISTICA NEERLANDICA, 2009, 63 (04) : 432 - 449
  • [29] A Keystroke Dynamics Based Approach for Continuous Authentication
    El Menshawy, Dina
    Mokhtar, Hoda M. O.
    Hegazy, Osman
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2014, 2014, 424 : 415 - 424
  • [30] Enhanced Authentication Using Keystroke and Mouse Dynamics
    Boopathi, Mythili
    Vani, M. P.
    ADVANCES IN KEY ENGINEERING MATERIALS, 2011, 214 : 230 - 234