User authentication using keystroke dynamics for cellular phones

被引:62
作者
Campisi, P. [1 ]
Maiorana, E. [1 ]
Lo Bosco, M. [1 ]
Neri, A. [1 ]
机构
[1] Univ Roma Tre, Dip Elettron Applicata, I-00146 Rome, Italy
关键词
Equal error rate - Keystroke analysis - Keystroke dynamics - New approaches - Secure authentications - Statistical classifier - User authentication - User verification;
D O I
10.1049/iet-spr.2008.0171
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A new approach for keystroke-based authentication when using a cellular phone keypad as input device is presented. In the proposed method, users are authenticated using keystroke dynamics acquired when typing fixed alphabetic strings on a mobile phone keypad. The employed statistical classifier is able to perform user veri. cation with an average equal error rate of about 13%. The obtained experimental results suggest that, when using mobile devices, a strong secure authentication scheme cannot rely on the sole keystroke dynamics, which however can be a module of a more complex system including, as basic security, a password-based protocol eventually hardened by keystroke analysis.
引用
收藏
页码:333 / 341
页数:9
相关论文
共 25 条
[1]  
ADAMS CW, 2005, P 1 INT WORKSH SYST
[2]  
Ahmad F, 2006, PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, P2
[3]  
[Anonymous], 2008, HDB BIOMETRICS
[4]   User authentication through typing biometrics features [J].
Araújo, LCF ;
Sucupira, LHR ;
Lizárraga, MG ;
Ling, LL ;
Yabu-Uti, JBT .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :851-855
[5]  
BERGADANO F, 2002, ACM T INFORM SYST SE, V5, P911
[6]   Authenticating mobile phone users using keystroke analysis [J].
Clarke, N. L. ;
Furnell, S. M. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (01) :1-14
[7]  
Clarke N. L., 2003, Information Management & Computer Security, V11, P161, DOI 10.1108/09685220310489526
[8]   Acceptance of subscriber authentication methods for mobile telephony devices [J].
Clarke, NL ;
Furnell, SM ;
Rodwell, PM ;
Reynolds, PL .
COMPUTERS & SECURITY, 2002, 21 (03) :220-228
[9]   Investigating five key predictive text entry with combined distance and keystroke modelling [J].
Dunlop, Mark D. ;
Masters, Michelle Montgomery .
PERSONAL AND UBIQUITOUS COMPUTING, 2008, 12 (08) :589-598
[10]  
*ITU, E161 ITU