Open Access   Article Go Back

Active Authentication on Mobile Device using Stylometry

Shikha Agarawal1 , Ashwin Gujarathi2 , Abhilash Dhumane3 , Pramil Bhosure4 , Mangesh Vinchankar5

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 854-858, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.854858

Online published on Apr 30, 2019

Copyright © Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar, “Active Authentication on Mobile Device using Stylometry,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.854-858, 2019.

MLA Style Citation: Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar "Active Authentication on Mobile Device using Stylometry." International Journal of Computer Sciences and Engineering 7.4 (2019): 854-858.

APA Style Citation: Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar, (2019). Active Authentication on Mobile Device using Stylometry. International Journal of Computer Sciences and Engineering, 7(4), 854-858.

BibTex Style Citation:
@article{Agarawal_2019,
author = {Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar},
title = {Active Authentication on Mobile Device using Stylometry},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {854-858},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4130},
doi = {https://doi.org/10.26438/ijcse/v7i4.854858}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.854858}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4130
TI - Active Authentication on Mobile Device using Stylometry
T2 - International Journal of Computer Sciences and Engineering
AU - Shikha Agarawal, Ashwin Gujarathi, Abhilash Dhumane, Pramil Bhosure, Mangesh Vinchankar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 854-858
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
243 200 downloads 92 downloads
  
  
           

Abstract

Behavioural biometrics takes the authentication one step further, requiring the user to not only have the right fingerprint to logon, but to prove that they are the same person whom they claim to be throughout the duration of the session. This takes into account the way in which a person interacts with a device, such as the force with which they hit a key, the angle they use to swipe a touch screen, or their typing speed. Tracking and analyzing these areas allows users to safely use the same password their behaviour for every login. We need to change the way we think about security across passwords, static and behavioural biometrics. Since virtually every authentication technique can be compromised, user should not rely solely on any single control for authorizing, but adopt a layered approach to security, combining the various available authentication technologies to improve both accuracy and user experience.

Key-Words / Index Term

Android, Sensors, API, SQLite, Java

References

[1] M. Duggan, “Cell phone activities 2013,” Pew ResearchCenter, Washington, DC, USA, 2013.
[2] S. Egelman et al., “Are you ready to lock?” in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2014, pp. 750–761.
[3] M. Harbach, E. von Zezschwitz, A. Fichtner, A. De Luca, and M. Smith, “Its a hard lock life: A field study of smartphone (un) locking behavior and risk perception,” in Proc. SOUPS, 2014, pp. 1–18.
[4] D. Van Bruggen et al., “Modifying smartphone user locking behavior,” in Proc. 9th Symp. Usable Privacy Security, 2013, pp. 1–14.
[5] C. Shen, Z. Cai, X. Guan, and J. Wang, “On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study,” in Proc. IEEE 5th IAPR ICB, 2012, pp. 378–383.
[6] A. Fridman et al., “Decision fusion for multimodal active authentication,” IEEE IT Professional, vol. 15, no. 4, pp. 29–33, Jul. 2013.
[7] M. O. Derawi, C. Nickel, P. Bours, and C. Busch, “Unobtrusive user-authentication on mobile phones using biometric gait recognition,” in Proc. IEEE 6th Int. Conf. IIH-MSP, 2010, pp. 306–311.
[8] F. Li, N. Clarke, M. Papadaki, and P. Dowland, “Active authentication for mobile devices utilising behaviour profiling,” Int. J. Inf. Security, vol. 13, no. 3, pp. 229–244, Jun. 2014.
[9] T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, “Continuous verification using multimodal biometrics,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 687–700, Apr. 2007. [10] J. Kittler, M. Hatef, R. Duin, and J. Matas, “On combining classifiers,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 3, pp. 226–239, Mar. 1998.