Advanced user authentication for mobile devices

被引:77
|
作者
Clarke, N. L. [1 ]
Furnell, S. M. [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
关键词
keystroke analysis; user authentication; biometrics; mobility; composite authentication;
D O I
10.1016/j.cose.2006.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. An issue that has traditionally been poorly served is user authentication, with the majority of devices relying upon problematic secret knowledge approaches. This paper proposes the use of more advanced biometric methods as an alternative. After considering the general range of available techniques and their applicability to mobile devices, the discussion focuses upon the concept of keystroke analysis. Results of a practical evaluation are presented based upon the entry of both telephone numbers and text messages on a mobile phone. The findings reveal the technique to have promise for certain users with average error rates below 5%. The paper then proceeds to explain how the accuracy could be further improved by incorporating keystroke analysis within a composite authentication mechanism that utilises a portfolio of authentication techniques to provide robust, accurate and transparent authentication of the user. (c) 2006 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:109 / 119
页数:11
相关论文
共 50 条
  • [31] Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns
    Zhang, Xiaomei
    Zhang, Pengming
    Hu, Haomin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [32] Trusted user authentication scheme combining password with fingerprint for mobile devices
    Zheng, Yu
    Xia, Jingchun
    He, Dake
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 63 - +
  • [33] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [34] Evaluation of feature values of surface electromyograms for user authentication on mobile devices
    Yamaba H.
    Kurogi A.
    Kubota S.-I.
    Katayama T.
    Park M.
    Okazaki N.
    Artificial Life and Robotics, 2017, 22 (1) : 108 - 112
  • [35] Face-Based Multiple User Active Authentication on Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1240 - 1250
  • [36] Outlier Detection for Risk-based User Authentication on Mobile Devices
    Papaioannou, Maria
    Zachos, Georgios
    Mantas, Georgios
    Essop, Ismael
    Saghezchi, Firooz B.
    Rodriguez, Jonathan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2778 - 2783
  • [37] Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning
    Jose, Christy James
    Rajasree, M. S.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1357 - 1372
  • [38] RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild
    Zhu, Tiantian
    Qu, Zhengyang
    Xu, Haitao
    Zhang, Jingsi
    Shao, Zhengyue
    Chen, Yan
    Prabhakar, Sandeep
    Yang, Jianfeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (02) : 466 - 483
  • [39] Behavior-based user authentication on mobile devices in various usage contexts
    Dmytro Progonov
    Valentyna Cherniakova
    Pavlo Kolesnichenko
    Andriy Oliynyk
    EURASIP Journal on Information Security, 2022
  • [40] Behavior-based user authentication on mobile devices in various usage contexts
    Progonov, Dmytro
    Cherniakova, Valentyna
    Kolesnichenko, Pavlo
    Oliynyk, Andriy
    EURASIP JOURNAL ON INFORMATION SECURITY, 2022, 2022 (01)