Authenticating mobile phone users using keystroke analysis

被引:197
作者
Clarke, N. L. [1 ]
Furnell, S. M. [1 ,2 ]
机构
[1] Univ Plymouth, Sch Comp, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Edith Cowan Univ, Sch Comp & Informat Sci, Perth, WA, Australia
关键词
mobile devices; authentication; biometrics; keystroke analysis; keystroke dynamics;
D O I
10.1007/s10207-006-0006-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile handsets have found an important place in modern society, with hundreds of millions currently in use. The majority of these devices use inherently weak authentication mechanisms, based upon passwords and PINs. This paper presents a feasibility study into a biometric-based technique, known as keystroke analysis - which authenticates the user based upon their typing characteristic. In particular, this paper identifies two typical handset interactions, entering telephone numbers and typing text messages, and seeks to authenticate the user during their normal handset interaction. It was found that neural network classifiers were able to perform classification with average equal error rates of 12.8%. Based upon these results, the paper concludes by proposing a flexible and robust framework to permit the continuous and transparent authentication of the user, thereby maximising security and minimising user inconvenience, to service the needs of the insecure and evermore functional mobile handset.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 21 条
[1]  
[Anonymous], P 3 INT NETW C INC U
[2]  
ASHBOURN J, 2000, BIOMETRIC
[3]  
BEST J, 2003, STEAL ORDER PHONE TH
[4]  
Bishop CM., 1995, Neural networks for pattern recognition
[5]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[6]   Acceptance of subscriber authentication methods for mobile telephony devices [J].
Clarke, NL ;
Furnell, SM ;
Rodwell, PM ;
Reynolds, PL .
COMPUTERS & SECURITY, 2002, 21 (03) :220-228
[7]  
DEMUTH H, 2001, TECHNICAL SUPPORT DO
[8]  
*GSM WORLD COM, 2004, WORLD CELL SUBS
[9]  
Hagan M., 1996, Neural network design
[10]  
Haykin S., 1999, Neural networks: a comprehensive foundation, V2nd ed.