Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Published: 01 October 2016 Publication History

Abstract

One can apply cell phones to access e-bank, buy stocks, pay credit card bills, and so on. The security issues of cell phones become extremely important. Most of subscribers use personal identification number PIN codes which combined with 6-8 numbers to protect their subscriber identity module cards from illegal accesses. It is easily to be decoded by the dictionary attack or shoulder surfing attack. Many studies employed keystroke dynamics to protect the PIN code, and the relative results exhibit that keystroke dynamics can indeed improve the security of a PIN code. However, the traditional keystroke dynamics-based authentication KDA system has to collect user's keystroke dynamics firstly and then produce a unique personal biometrics. It is inconvenient for users when changing their PIN codes is required, because the corresponding KDA systems should be retrained. To solve the previously mentioned drawbacks, this paper proposes a novel technique that allows users to change their PIN codes anytime without any extra retraining. This technique not only enhance the security of the PIN codes but also enrich the security of accessing e-bank, buying stocks, paying credit card bill, and other service via smart phones. Conducted experiment results show that the proposed system can effectively improve the KDA system to distinguish legitimate users and impostors even when users change their original passwords. Copyright © 2015 John Wiley & Sons, Ltd.

References

[1]
Chang TY, Tsai CJ, Lin JH. A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. The Journal of Systems and Software 2012; Volume 85 Issue 5: pp.1157-1165.
[2]
Ogihara A, Matsumura H, Shiozaki A. Biometric Verification using keystroke motion and key press timing for ATM user authentication. Proceedings of IEEE international symposium on intelligent signal processing and communications, 2006; pp.223-226.
[3]
Guo MH, Deng DJ. Centralized conference key mechanism with elliptic curve cryptography and Lagrange interpolation for sensor networks. IET Communications 2011; Volume 5 Issue 2: pp.1727-1731.
[4]
Guo MH, Liaw HT, Chen JF, Deng DJ. Secure authentication mechanism for RFID tag in WLAN convergence 3G networks. Security and Communication Networks 2012; Volume 5 Issue 3: pp.319-330.
[5]
Tsai CJ, Chang TY, Yang YJ, Wu MS, Li YC. An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification. International Journal of Innovative Computing, Information and Control, special issue on Decision Making on Information Security Strategy & Technology 2012; Volume 8 Issue 10: pp.7875-7886.
[6]
Elliott SJ, Peters JL, Rishel TJ. An introduction to biometrics technology. Journal of Industrial Teacher Education 2004; Volume 41 Issue 4: pp.1-8.
[7]
Giot R, El-Abed M, Hemery B, Rosenberge C. Unconstrained keystroke dynamics authentication with shared secret. Computers & Security 2011; Volume 30 Issue 6-7: pp.427-445.
[8]
Lee HJ, Cho S. Retraining a keystroke dynamics-based authenticator with impostor patterns. Computers and Security 2007; Volume 26 Issue 4: pp.300-310.
[9]
Robinson JA, Liang VM, Chambers JAM, MacKenzie CL. Computer user verification using login string keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 1998; Volume 28 Issue 2: pp.236-241.
[10]
Araujo LCF, Sucupira LHRJr, Lizarraga MG, Ling LL, Yabu-Uti JBT. User Authentication through typing biometrics features. IEEE Transactions on Signal Processing 2005; Volume 53 Issue 2: pp.851-855.
[11]
Bleha S, Slivinsky C, Hussien B. Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence 1990; Volume 12 Issue 12: pp.1217-1222.
[12]
Gaines RS, Lisowski W, Press SJ, Shapiro N. Authentication by keystroke timing: some preliminary results No. RAND-R-2526-NSF. RAND COPR SANTA MONICA CA 1980.
[13]
Yu E, Cho S. Keystroke dynamics identity verification-its problems and practical solutions. Computers & Security 2004; Volume 23 Issue 5: pp.428-440.
[14]
Gordon LA, Loeb MP, Lucyshyn W, Richardson R. CSI/FBI computer crime and security survey. Computer Security Institute: San Francisco, CA, 2005.
[15]
Eltafir WE, Salami MJE, Ismail AF, Lai WK. Dynamic Keystroke analysis using ar model. Proceedings of IEEE international conference on industrial technology, 2004; pp.1555-1560.
[16]
Hu J, Gingrich D, Sentosa A. A k-nearest neighbor approach for user authentication through biometric keystroke dynamics. Proceedings of IEEE international conference on communications, 2008; pp.1556-1560.
[17]
De Ru WG, Eloff JHP. Enhanced password authentication through fuzzy logic. IEEE Expert 1997; Volume 17 Issue 6: pp.38-45.
[18]
Clarke NL, Furnell SM, Lines BM, Reynolds PL. Keystroke dynamics on a mobile handset: a feasibility study. Information Management & Computer Security 2003; Volume 11 Issue 4: pp.161-166.
[19]
Clarke NL, Furnell SM. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 2006; Volume 6 Issue 1: pp.1-14.
[20]
Campisi P, Maiorana E, Bosco ML, Neri A. User authentication using keystroke dynamics for cellular phones. IET Signal Processing 2009; Volume 3 Issue 4: pp.333-341.
[21]
Tsai CJ, Chang TY, Lin JH. Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. Security and Communication Networks 2014; Volume 7 Issue 4: pp.750-758.
[22]
Liu CL, Chang TY, Chiang ML, Tsai CJ. A simple keystroke dynamics-based authentication system using means and standard deviations. Journal of Internet Technology 2012; Volume 13 Issue 3: pp.439-444.
[23]
Boechat GC, Ferreira JC, Filho ECBC. Authentication personal. Proceedings of IEEE international conference on intelligent and advanced systems, 2007; pp.254-256.
[24]
Teh PS, Yue S, Teoh ABJ. Improving Keystroke dynamics authentication system via multiple feature fusion scheme.Proceedings of IEEE international conference on cyber security, cyber warfare and digital forensic, 2012; pp.277-282.
[25]
Hwang S, Cho S, Park S. Keystroke dynamics-based authentication for mobile devices. Computers & Security 2009; Volume 28 Issue 1-2: pp.85-93.
[26]
Fawcett T. An introduction to ROC analysis. Pattern Recognition Letters 2006; Volume 27 Issue 8: pp.861-874.
[27]
Saevanee H, Bhatarakosol P. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. Proceedings of international conference on computer and electrical engineering, 2008; pp.82-86.
[28]
Chernick MR. Bootstrap Methods: A Guide for Practitioners and Researchers, John Wiley & Sons, 2007.

Cited By

View all
  • (2023)Biometric Authentication Methods on Mobile PlatformsInternational Journal of Mobile Computing and Multimedia Communications10.4018/IJMCMC.33413014:1(1-16)Online publication date: 14-Jul-2023
  • (2018)Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion SensorsSecurity and Communication Networks10.1155/2018/25674632018(2)Online publication date: 1-Mar-2018
  1. A changeable personal identification number-based keystroke dynamics authentication system on smart phones

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Security and Communication Networks
      Security and Communication Networks  Volume 9, Issue 15
      October 2016
      468 pages
      ISSN:1939-0114
      EISSN:1939-0122
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 October 2016

      Author Tags

      1. biometrics
      2. keystroke dynamics
      3. personal identification number
      4. smart phones
      5. statistical classifier
      6. subscriber identity module card

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Biometric Authentication Methods on Mobile PlatformsInternational Journal of Mobile Computing and Multimedia Communications10.4018/IJMCMC.33413014:1(1-16)Online publication date: 14-Jul-2023
      • (2018)Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion SensorsSecurity and Communication Networks10.1155/2018/25674632018(2)Online publication date: 1-Mar-2018

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media