Introducing touchstroke: keystroke-based authentication system for smartphones

被引:60
|
作者
Kambourakis, Georgios [1 ]
Damopoulos, Dimitrios [2 ]
Papamartzivanos, Dimitrios [1 ]
Pavlidakis, Emmanouil [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Lab Informat & Commun Syst Secur, GR-83200 Karlovassi, Samos, Greece
[2] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
关键词
keystroke dynamics; touchscreen; authentication; smartphones; Android; USER AUTHENTICATION; DYNAMICS;
D O I
10.1002/sec.1061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke dynamics is a well-investigated behavioural biometric based on the way and rhythm in which someone interacts with a keyboard or keypad when typing characters. This paper explores the potential of this modality but for touchscreen-equipped smartphones. The main research question posed is whether touchstroking' can be effective in building the biometric profile of a user, in terms of typing pattern, for future authentication. To reach this goal, we implemented a touchstroke system in the Android platform and executed different scenarios under disparate methodologies to estimate its effectiveness in authenticating the end-user. Apart from typical classification features used in legacy keystroke systems, we introduce two novel ones, namely, speed and distance. From the experiments, it can be argued that touchstroke dynamics can be quite competitive, at least when compared to similar results obtained from keystroke evaluation studies. As far as we are aware of, this is the first time this newly arisen behavioural trait is put into focus. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:542 / 554
页数:13
相关论文
共 50 条
  • [1] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Nauman, Mohammad
    Ali, Tamleek
    Rauf, Azhar
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2149 - 2161
  • [2] TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
    Nauman, Mohammad
    Ali, Tamleek
    [J]. INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 286 - +
  • [3] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Mohammad Nauman
    Tamleek Ali
    Azhar Rauf
    [J]. Telecommunication Systems, 2013, 52 : 2149 - 2161
  • [4] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [5] Improvements to Keystroke-Based Authentication By Adding Linguistic Context
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [6] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [7] Cost-Effective Kernel Ridge Regression Implementation for Keystroke-Based Active Authentication System
    Wu, Pei-Yuan
    Fang, Chi-Chen
    Chang, Jien Morris
    Kung, Sun-Yuan
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (11) : 3916 - 3927
  • [8] Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 80 - 85
  • [9] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    [J]. Cybersecurity, 4
  • [10] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    [J]. CYBERSECURITY, 2021, 4 (01)