Keystroke-Based Biometric Authentication in Mobile Applications

Keystroke-Based Biometric Authentication in Mobile Applications

Fatima Kabli, Sad houari Nawal, Matoug Afaf
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJSI.303574
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. It is considered as a real alternative to several authentication mechanisms. In order to improve authentication security in mobile applications, especially mobile chat applications , we propose in this work an approach of user keystroke-based authentication which is based on two important mechanisms, firstly the authentication is done on the basis of a supervised classification model trained on the dynamic keystroke database (android platform) the prediction accuracy has reached high values. When the attacker used the same behavior as the legitimate user we are strengthening security by another authentication mechanism based on three parameters during the opening of a communication session between two users (the number of messages per session, connection time and inter-click time). The proposed system has shown satisfactory results by combining user behaviours and connection parameters during an open session between two users to reinforce the authentication aspect.
Article Preview
Top

In this paper, (Kim & Kang, 2020), Kim and all propose a new KDA method based on freely typed text for mobile devices named FACT. As a first step, they are developed a typing data collector from three different smartphone sensors in two languages (English and Korean). From the raw data, they have extracted 17 micro behavioural features related to finger length, hand size, finger size, and muscle flexibility. The evaluation results of this approach have shown perfect protection ability with Korean. This typing data set is made public without any restrictions.

The work of (Buker et al, 2019) analyses the interaction between gender and typing dynamics. The experiments show that when gender is different, people tend to type differently while interacting with live chat interfaces, such as those available in popular apps, like WhatsApp or Skype. The experimental results show that the differences, in terms of gender, are sufficiently consistent to allow automatic gender recognition with an accuracy of over 95%.

In the work of (O'Gorman, 2003) the attacker looks for the password while it is being typed. One of the best solutions for all these attacks is to combine the biometric pattern with the password. By doing this, even if the attacker looks at or knows our password, he cannot type in the same way as legitimate user types.

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing