Authenticating Mobile Phone User using Keystroke Dynamics
Baljit Singh Saini1 , Navdeep Kaur2 , Kamaljit Singh Bhatia3
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-12 , Page no. 372-377, Dec-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i12.372377
Online published on Dec 31, 2018
Copyright © Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia, “Authenticating Mobile Phone User using Keystroke Dynamics,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.372-377, 2018.
MLA Style Citation: Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia "Authenticating Mobile Phone User using Keystroke Dynamics." International Journal of Computer Sciences and Engineering 6.12 (2018): 372-377.
APA Style Citation: Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia, (2018). Authenticating Mobile Phone User using Keystroke Dynamics. International Journal of Computer Sciences and Engineering, 6(12), 372-377.
BibTex Style Citation:
@article{Saini_2018,
author = {Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia},
title = {Authenticating Mobile Phone User using Keystroke Dynamics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {372-377},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3346},
doi = {https://doi.org/10.26438/ijcse/v6i12.372377}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.372377}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3346
TI - Authenticating Mobile Phone User using Keystroke Dynamics
T2 - International Journal of Computer Sciences and Engineering
AU - Baljit Singh Saini, Navdeep Kaur, Kamaljit Singh Bhatia
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 372-377
IS - 12
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
564 | 335 downloads | 254 downloads |
Abstract
Since few decades, the simple password authentication has either replaced or compounded with biometrics (such as Facial Recognition, Fingerprint Scan etc.) to provide better security. Keystroke Dynamics is behavioral biometrics that can perform continuous authentication to detect intruders. In this paper, we investigate whether user specific password gives better performance than artificially rhythmed password. Also, impact of sensory data on overall performance of the system is examined. Finally, Genetic Algorithm is used to optimize the features. The features used to analyze the user data were hold time, flight time and X, Y and Z axis reading from accelerometer sensor. Results showed that user data gives better performance than artificially rhythmed passwords. Best accuracy of around 90% was achieved by using user specified passwords and optimizing the results with genetic algorithm.
Key-Words / Index Term
Keystroke dynamics, Typing behaviour, Mobile, Authentication, Biometrics
References
[1] S. Bhatt and T. Santhanam, “Keystroke dynamics for biometric authentication - A survey,” 2013 Int. Conf. Pattern Recognition, Informatics Mob. Eng., pp. 17–23, 2013.
[2] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication,” Futur. Gener. Comput. Syst., vol. 16, no. 4, pp. 351–359, 2000.
[3] I. Bhardwaj, N. D. Londhe, and S. K. Kopparapu, “Study of imposter attacks on novel fingerprint dynamics based verification system,” IEEE Access, vol. 5, pp. 595–606, 2017.
[4] R. Solanki and P. Shukla, “Estimation of the User’s Emotional State by Keystroke Dynamics,” Int. J. Comput. Appl., vol. 94, no. 13, pp. 21–23, 2014.
[5] N. L. Clarke, S. M. Furnell, B. M. Lines and P. L. Reynolds, “Keystroke dynamics on a mobile handset: a feasibility study,” Information Management & Computer Security, vol. 11, no. 4, pp. 161–166, 2003.
[6] T. Sim and R. Janakiraman, “Are digraphs good for free-text keystroke dynamics?,” Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2007.
[7] K. S. Killourhy and R. Maxion, “Comparing Anomaly Detectors for Keystroke Dynamics,” IEEE Computer Society Press, Los Alamitos, California, pp. 125–134, 2009.
[8] S. Hwang, S. Cho, and S. Park, “Keystroke dynamics-based authentication for mobile devices. Computers and Security, vol. 28, no. 2, pp. 85–93, 2003.
[9] R. Giot, M. El-Abed and C. Rosenberger, “GREYC keystroke: A benchmark for keystroke dynamics biometric systems. IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS, 2009.
[10] Y. Li, B. Zhang, Y. Cao, S. Zhao, Y. Gao and J. Liu, “Study on the BeiHang Keystroke Dynamics Database,” In International Joint Conference on Biometrics, pp. 1-5, 2011.
[11] J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie, “Computer user verification using login string keystroke dynamics,” IEEE Trans. Syst. Man, Cybern. Part ASystems Humans., vol. 28, no. 2, pp. 236–241, 1998.
[12] S. Haider, A. Abbas, and A. K. Zaidi, “A multi-technique approach for user identification through keystroke dynamics,” IEEE Int. Conf. Syst. man Cybern., vol. 2, pp. 1336–1341, 2000.
[13] F. Gutiérrez, “Biometrics and data mining: Comparison of data mining-based keystroke dynamics methods for identity verification,” MICAI 2002 Adv. …, pp. 460–469, 2002.
[14] V. Kacholia and S. Pandit, “Biometric Authentication using Random Distributions (BioART),” Proc. 15th Can. IT Secur. Symp. Canada, vol. 5, pp. 1–8, 2003.
[15] L. C. Freire Araujo, M. Gustavo Lizarraga, L. H. Rabelo Sucupira, J. B. Tadanobu Yabu-uti, and L. L. Lee, “Typing Biometrics User Authentication based on Fuzzy Logic,” Lat. Am. Trans. IEEE (Revista IEEE Am. Lat., vol. 2, no. 1, pp. 69–74, 2004.
[16] W. E. Eltahir, M. J. E. Salami, A. F. Ismail, and W. K. Lai, “Dynamic keystroke analysis using AR model,” Industrial Technology, 2004. IEEE ICIT ’04. 2004 IEEE International Conference on, vol. 3. p. 1555–1560 Vol. 3, 2004.
[17] Y. Sang, H. Shen, and P. Fan, “Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine,” Lect. Notes Comput. Sci., vol. 3320, pp. 666–669, 2004.
[18] S. S. Joshi and V. V. Phoha, “Investigating hidden Markov models capabilities in anomaly detection,” in Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43, vol. 1, 2005.