Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users

This paper focuses on account stolen case of smart phone users. In order to enhance the credibility of user authentication, an authentication method based on virtual keystroke dynamics behavior of touch screen is proposed in this paper. The proposed method extracts time dependent characteristics and pressure related characteristics of users' virtual keystroke dynamics behavior, builds combined authentication model by RBF networks, checks whether the virtual keystroke dynamics behavior of current user matches that of expected user to authenticate user's identity. The experiment shows that the proposed method has the expected result.

[1]  Kang Ryoung Park,et al.  A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones , 2010, Machine Vision and Applications.

[2]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[3]  Georgios Kambourakis,et al.  Introducing touchstroke: keystroke-based authentication system for smartphones , 2016, Secur. Commun. Networks.

[4]  Sungzoon Cho,et al.  Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..

[5]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[6]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[7]  Iwao Sasase,et al.  Anomaly Detection on Mobile Phone Based Operational Behavior , 2008 .

[8]  Sahin Albayrak,et al.  Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[9]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[10]  Jean-Pierre Seifert,et al.  pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.

[11]  Tyler Highlander,et al.  Utilization of keyboard dynamics for unique identification of human users , 2014, NAECON 2014 - IEEE National Aerospace and Electronics Conference.

[12]  Shari Trewin,et al.  Biometric authentication on a mobile device: a study of user effort, error and task disruption , 2012, ACSAC '12.

[13]  Tingting Mu,et al.  Detection of breast cancer using v-SVM and RBF networks with self organized selection of centers , 2005 .

[14]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[15]  Charlie Miller,et al.  Injecting SMS messages into smart phones for security analysis , 2009 .

[16]  Michal Choras,et al.  Contactless palmprint and knuckle biometrics for mobile devices , 2011, Pattern Analysis and Applications.

[17]  R. P. Anto Kumar,et al.  User Authentication Based On Keystroke Dynamics , 2014 .