Keystroke-Based Biometric Authentication in Mobile Devices

被引:5
|
作者
Urtiga, E. V. C. [1 ]
Moreno, E. D. [2 ]
机构
[1] Univ Estado Amazonas, Manaus, Amazonas, Brazil
[2] Univ Fed Sergipe, Aracaju, SE, Brazil
关键词
Biometric Authentication; Keystroke; Mobile Devices; Embedded Systems; Euclidean Distance; Cell Phones; IDENTITY VERIFICATION;
D O I
10.1109/TLA.2011.5893788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a model for biometric authentication of users based on dynamic typing (keystroke) in mobile devices. In our model, the user accesses the system by typing a string (password) that is monitored in real time. The model captures the time needed for the user to press and release the keys when he is typing and we compare this information with those previously stored into the model. If the result is the same as registered, the user is considered authentic and has access to the system, otherwise the user is regarded as an impostor and has its access blocked by the system. Apos a realizacao de todo o experimento usando o metodo da distancia euclidiana foi possivel chegar a uma taxa de. After performing the experiment using the method of Euclidean distance we reached a FAR = 12,97% and FRR = 2,25%.
引用
收藏
页码:383 / 390
页数:8
相关论文
共 50 条
  • [1] Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 80 - 85
  • [2] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [3] Keystroke dynamics-based authentication for mobile devices
    Hwang, Seong-Seob
    Cho, Sungzoon
    Park, Sunghoon
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 85 - 93
  • [4] Improvements to Keystroke-Based Authentication By Adding Linguistic Context
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [5] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [6] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Nauman, Mohammad
    Ali, Tamleek
    Rauf, Azhar
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2149 - 2161
  • [7] TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
    Nauman, Mohammad
    Ali, Tamleek
    [J]. INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 286 - +
  • [8] Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication
    Alshanketi, Faisal
    Traore, Issa
    Awad, Ahmed E. A.
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 66 - 73
  • [9] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    [J]. Cybersecurity, 4
  • [10] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    [J]. CYBERSECURITY, 2021, 4 (01)