Abstract
Mobile devices require a screen lock method for authentication. Although conventional screen locks are typically based on pattern, PIN code or password authentication, they are vulnerable to shoulder-surfing attacks and video recording attacks. To avoid such vulnerability, a rhythm-based authentication (RA) method that leverages the timing of screen taps has been proposed as an authentication factor. This method uses features, such as tap pressure, distance between taps, and tap timing, for authentication. However, this method requires a server for a user to be authenticated. In this paper, we propose an improved RA method that can be applied in a mobile device by using a Random Forest classifier. We conducted a series of experiments to clarify (i) importance of the features (ii) classification accuracy, and (iii) required number of taps. The proposed RA method was tested by 24 participants. After carefully choosing features, we show that when the number of taps is five, the accuracy is 94.16%, which is an improvement of 1.79%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alzubaidi, A., Kalita, J.: Authentication of smartphone users using behavioral biometrics. IEEE Commun. Surv. Tutor. 18(3), 1998–2026 (2016)
Araújo, L.C., Sucupira, L.H., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User authentication through typing biometrics features. IEEE Trans. Signal Process. 53(2), 851–855 (2005)
Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
Cao, K., Jain, A.K.: Hacking mobile phones using 2D printed fingerprints (2016). Accessed 27 Mar 2017
Chang, T., Peng, C., Tsai, C., Chen, Y., Cheng, P.: Personalized rhythm click based authentication system improvement using a statistical classifier. In: IEEE International Conference on Information Communication and Management (ICICM), pp. 39–43 (2012)
Chang, T.Y., Tsai, C.J., Yang, Y.J., Cheng, P.C.: User authentication using rhythm click characteristics for non-keyboard devices. In: International Conference on Asia Agriculture and Animal IPCBEE, pp 167–171 (2011)
Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: Privacy Security and Trust (PST), pp. 205–212 (2010)
De Luca, A., Harbach, M., von Zezschwitz, E., Maurer, M.E., Slawik, B.E., Hussmann, H., Smith, M.: Now you see me, now you don’t: protecting smartphone authentication from shoulder surfers. In: ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 2937–2946 (2014)
Goode, A.: Bring your own finger-how mobile is bringing biometrics to consumers. Biomet. Technol. Today 2014(5), 5–9 (2014)
IPA: Minimum information security controls guide for organizations - IPA (2012). https://www.ipa.go.jp/security/keihatsu/shiori/management/01_guidebook_en.pdf. Accessed 21 Mar 2017
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Kita, Y., Aburada, K., Park, M., Okazaki, N.: Proposal of a puzzle authentication method with shoulder-surfing attack resistance and high-usability. IEICE Commun. Express 4(3), 95–98 (2015)
Kita, Y., Kamizato, K., Park, M., Okazaki, N.: Proposal of rhythm authentication method using users classification by self-organizing map. In: The 18th International Conference on Network-Based Infomation System (NBiS2015) (2015)
Kohonen, T.: The self-organizing map. Neurocomputing 21(1), 1–6 (1998)
Liaw, A., Wiener, M.: Classocatopm and regrwssion by randomforest. Newslett. R Proj. (R News) 2(3), 18–22 (2002)
Rogowski, M., Saeed, K., Rybnik, M., Tabedzki, M., Adamski, M.: User authentication for mobile devices. In: Computer Information Systems and Industrial Management, pp. 47–58 (2013)
Takada, T.: FakePointer: an authentication scheme for a better security against a peeping attack by a video camera. In: International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM) (2008)
Teh, P.S., Yue, S., Teoh, A.B.: Feature fusion approach on keystroke dynamics efficiency enhancement. Int. J. Cyber-Secur. Digit. Foren. (IJCSDF) 1(1), 20–31 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Hori, T., Kita, Y., Toyoda, K., Okazaki, N., Park, M. (2018). Empirical Evaluation of Rhythm-Based Authentication Method for Mobile Devices. In: Barolli, L., Enokido, T., Takizawa, M. (eds) Advances in Network-Based Information Systems. NBiS 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 7. Springer, Cham. https://doi.org/10.1007/978-3-319-65521-5_46
Download citation
DOI: https://doi.org/10.1007/978-3-319-65521-5_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65520-8
Online ISBN: 978-3-319-65521-5
eBook Packages: EngineeringEngineering (R0)