A novel approach for user authentication using keystroke dynamics

被引:5
作者
Shekhawat, Kirty [1 ]
Bhatt, Devershi Pallavi [1 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur, Rajasthan, India
关键词
Machine learning; Passwords; Behavioural biometric; Sensors; Keystroke dynamics; User authentication; ARTIFICIAL RHYTHMS;
D O I
10.1080/09720529.2022.2133241
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
One Time Password (OTP) and Text Password are becoming less important in the current age of cybercrime because of the rapid development of new security systems. A user authentication system that is easy, robust, scalable, and cost-effective is a must. For both security and surveillance purposes, keystroke biometrics is a viable option. Behavior biometrics, of which keystroke biometrics is a subset, is used to identify individuals based on the way they type. Typing habits are not set in stone and are subject to change depending on the scenario, the device being used, and the user's emotional state. As a result, the performance of a keystroke biometrics-based user authentication system is influenced by how well the retrieved information from typing and classification algorithms is processed. Using a keyboard with an array of pressure sensors, this research presents a unique way to keystroke dynamics-based authentication. The goal of this study is to develop user profiles that are unique and different in order to improve the suggested system's efficiency. A real-world dataset is used to test the suggested method. The outcome is achieved with a 97% success rate in experiments.
引用
收藏
页码:2015 / 2027
页数:13
相关论文
共 18 条
[1]   Non-conventional keystroke dynamics for user authentication [J].
Alsultan, Arwa ;
Warwick, Kevin ;
Wei, Hong .
PATTERN RECOGNITION LETTERS, 2017, 89 :53-59
[2]  
[Anonymous], 2013, ISRN SIGNAL PROCESSI
[3]   Authentication systems: A literature review and classification [J].
Barkadehi, Mohammadreza Hazhirpasand ;
Nilashi, Mehrbaksh ;
Ibrahim, Othman ;
Fardi, Ali Zakeri ;
Samad, Sarminah .
TELEMATICS AND INFORMATICS, 2018, 35 (05) :1491-1511
[4]   Development of augmented reality application to detect the 3D marker through POSIT algorithm [J].
Bhakar, Suman ;
Bhatt, Devershi Pallavi .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02) :365-372
[5]  
Bhatt D.P., 2015, EMERGING RES COMPUTI, DOI [10.1007/978-81-322-2550-8_46, DOI 10.1007/978-81-322-2550-8_46]
[6]   Light-weighted cryptographic algorithms for energy efficient applications [J].
Bhatt, Devershi Pallavi ;
Raja, Linesh ;
Sharma, Shilpa .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02) :643-650
[7]  
Bours P., 2017, LANGUAGE DEPENDENT C
[8]  
Cho SZ, 2006, LECT NOTES COMPUT SC, V3832, P626
[9]   Advanced user authentication for mobile devices [J].
Clarke, N. L. ;
Furnell, S. M. .
COMPUTERS & SECURITY, 2007, 26 (02) :109-119
[10]   A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics [J].
Gedikli, Ahmet Melih ;
Efe, Mehmet Onder .
PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 1144 :9-23