Authenticating mobile phone users using keystroke analysis

Mobile handsets have found an important place in modern society, with hundreds of millions currently in use. The majority of these devices use inherently weak authentication mechanisms, based upon passwords and PINs. This paper presents a feasibility study into a biometric-based technique, known as keystroke analysis – which authenticates the user based upon their typing characteristic. In particular, this paper identifies two typical handset interactions, entering telephone numbers and typing text messages, and seeks to authenticate the user during their normal handset interaction. It was found that neural network classifiers were able to perform classification with average equal error rates of 12.8%. Based upon these results, the paper concludes by proposing a flexible and robust framework to permit the continuous and transparent authentication of the user, thereby maximising security and minimising user inconvenience, to service the needs of the insecure and evermore functional mobile handset.

[1]  Steven Furnell,et al.  Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset , 2005 .

[2]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[3]  Michael Wagner,et al.  Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm , 1995, Int. J. Hum. Comput. Stud..

[4]  J. Nazuno Haykin, Simon. Neural networks: A comprehensive foundation, Prentice Hall, Inc. Segunda Edición, 1999 , 2000 .

[5]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[6]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[7]  Henrietta Hardy Mrs Hammond The complete guide , 1883 .

[8]  Sungzoon Cho,et al.  Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..

[9]  Richard E. Smith,et al.  Authentication: From Passwords to Public Keys , 2001 .

[10]  Eric R. Ziegel,et al.  Engineering Statistics , 2004, Technometrics.

[11]  Julian Ashbourn,et al.  Biometrics: Advanced Identity Verification , 2000, Springer London.

[12]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[13]  T Kohonen The Self-Organising Map, a Possible Model of Brain Maps , 1997 .

[14]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[15]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[16]  Martin T. Hagan,et al.  Neural network design , 1995 .