skip to main content
10.1145/3368691.3368725acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

User authentication on smartphones using keystroke dynamics

Published: 02 December 2019 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2019 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

These days, mobile devices have very sensitive and personal data that needs to be secured. Mobile devices use authentication techniques to protect data from unauthorized access. Consequently, many authentication mechanisms were proposed and many techniques were applied. One of these mechanisms is the analysis of the typing rhythm. It is also known as keystroke dynamics which enhances the password-based authentication by identifying the users based on their typing rhythms. This paper proposes a new authentication mechanism using keystroke dynamics. The dataset which is used in this research consists of 71 features for 42 users with 2142 records. The proposed method consists of two stages; firstly, applying some statistical methods on the 71 features in order to result with valuable new features, then the second stage is to use the existing features with the resulted features with the Random Forest machine learning algorithm. Experimental results showed an accuracy of 94.26%.

References

[1]
Ali, M. L., Monaco, J. V., Tappert, C. C., & Qiu, M. (2017). Keystroke biometric systems for user authentication. Journal of Signal Processing Systems, 86(2--3), 175--190.
[2]
Ivannikova, E., David, G., & Hämäläinen, T. (2017, July). Anomaly detection approach to keystroke dynamics based user authentication. In Computers and Communications (ISCC), 2017 IEEE Symposium on (pp. 885--889). IEEE.
[3]
Hocquet, S., Ramel, J. Y., & Cardot, H. (2007). User classification for keystroke dynamics authentication. Advances in biometrics, 531--539.
[4]
Poss, J. C., Boye, D., & Mobley, M. W. (2008). "Biometric voice authentication". U.S. Patent No. 7,386,448. Washington, DC: U.S. Patent and Trademark Office.
[5]
Saini, B. S., Kaur, N., & Bhatia, K. S. (2016). Keystroke dynamics for mobile phones: A survey. Indian Journal of Science and Technology, 9(6).
[6]
Bergadano, F., Gunetti, D., & Picardi, C. (2002). User authentication through keystroke dynamics. ACM Transactions on Information and System Security (TISSEC), 5(4), 367--397.
[7]
Karnan, M., Akila, M., & Krishnaraj, N. (2011). Biometric personal authentication using keystroke dynamics: A review. Applied Soft Computing, 11(2), 1565--1573.
[8]
Kolakowska, A. (2018). Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition. In Human-Computer Systems Interaction (pp. 42--52). Springer, Cham.
[9]
T. Feng, Z. Liu, K.-A. Kwon, W. Shi, B. Carbunary, Y. Jiang, and N. Nguyen, "Continuous mobile authentication using touchscreen gestures," In Proc. HST, pp. 451--456, 2012.
[10]
L. Li, X. Zhao, and G. Xue, "Unobservable Re-authentication for Smartphones," In Proc. NDSS, 2013.
[11]
Y. Meng, D.S. Wong, and L.F. Kwok, "Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones," In Proc. Annual ACM Symposium on Applied Computing (SAC), pp. 680--1687, 2014.
[12]
W. Meng, D.S. Wong, and L.F. Kwok, "The Effect of Adaptive Mechanism on Behavioural Biometric Based Mobile Phone Authentication," Information Management and Computer Security, vol. 22, no. 2, pp. 155--166, 2014
[13]
Johansen UA. Keystroke dynamics on a Device with Touch Screen. Master's Thesis, Computer Science and Media Technology Department, Gjovic University, 2012.
[14]
Antal, M., Szabó, L. Z., & László, I. (2015). Keystroke dynamics on android platform. Procedia Technology, 19, 820--826.
[15]
Zhou, Q., Yang, Y., Hong, F., Feng, Y., & Guo, Z. (2016, December). User Identification and Authentication Using Keystroke Dynamics with Acoustic Signal. In Mobile Ad-Hoc and Sensor Networks (MSN), 2016 12th International Conference on (pp. 445--449). IEEE.
[16]
Trojahn, M., Arndt, F., & Ortmeier, F. (2013). Authentication with keystroke dynamics on touchscreen keypads-effect of different n-graph combinations. In Third International Conference on Mobile Services, Resources and Users (MOBILITY) (pp. 114--19).
[17]
Killourhy, K. S., & Maxion, R. A. (2009, June). Comparing anomaly-detection algorithms for keystroke dynamics. In Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on (pp. 125--134). IEEE.
[18]
Ibe, O. (2014). Fundamentals of applied probability and random processes. Academic Press.
[19]
Hocquet, S., Ramel, J. Y., & Cardot, H. (2007). User classification for keystroke dynamics authentication. Advances in biometrics, 531--539.
[20]
Breiman, L. (2001). Random forests. Machine learning, 45(1), 5--32.
[21]
Bouckaert, R. R. (2004). Bayesian network classifiers in weka.
[22]
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann.

Cited By

View all
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • (2023)Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile AuthenticationJournal of Cybersecurity and Privacy10.3390/jcp30200133:2(227-258)Online publication date: 13-Jun-2023
  • (2023)Squeez’In: Private Authentication on Smartphones based on Squeezing GesturesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581419(1-15)Online publication date: 19-Apr-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DATA '19: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems
December 2019
376 pages
ISBN:9781450372848
DOI:10.1145/3368691
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 December 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. behavioral authentication
  2. biometrics authentication
  3. keystroke dynamics
  4. typing rhythm
  5. user authentication

Qualifiers

  • Research-article

Conference

DATA'19

Acceptance Rates

DATA '19 Paper Acceptance Rate 58 of 146 submissions, 40%;
Overall Acceptance Rate 74 of 167 submissions, 44%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User ProfilingIEEE Access10.1109/ACCESS.2024.341178312(82996-83021)Online publication date: 2024
  • (2023)Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile AuthenticationJournal of Cybersecurity and Privacy10.3390/jcp30200133:2(227-258)Online publication date: 13-Jun-2023
  • (2023)Squeez’In: Private Authentication on Smartphones based on Squeezing GesturesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581419(1-15)Online publication date: 19-Apr-2023
  • (2023)Smartphone-derived Virtual Keyboard Dynamics Coupled with Accelerometer Data as a Window into Understanding Brain HealthProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580906(1-15)Online publication date: 19-Apr-2023
  • (2022)A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research DirectionsSensors10.3390/s2214516822:14(5168)Online publication date: 10-Jul-2022
  • (2022)A Systematic Literature Review on Latest Keystroke Dynamics Based ModelsIEEE Access10.1109/ACCESS.2022.319775610(92192-92236)Online publication date: 2022
  • (2022)Continuous user authentication on smartphone via behavioral biometrics: a surveyMultimedia Tools and Applications10.1007/s11042-022-13245-982:2(1633-1667)Online publication date: 9-Jun-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media