Modular Logic of Authentication Using Dynamic Keystroke Pattern Analysis

被引:3
作者
Bhattasali, Tapalina [1 ]
Panasiuk, Piotr [2 ]
Saeed, Khalid [2 ,3 ]
Chaki, Nabendu [1 ]
Chaki, Rituparna [1 ]
机构
[1] Univ Calcutta, Kolkata, India
[2] Warsaw Univ Technol, Warsaw, Poland
[3] Bialystok Tech Univ, Bialystok, Poland
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015) | 2016年 / 1738卷
关键词
access control; authentication; biometrics; keystroke dynamics; computer security; modular authentication;
D O I
10.1063/1.4951959
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Authenticating users in a continual manner has become extremely critical for a wide range of applications in the domain of pervasive computing and Internet of Things (IoT). In these days, it's also an accepted fact that user authentication based on biometric features is often more efficient than the traditional means of password-based authentication. However, many of the existing biometric techniques like Iris or finger-print recognition are effective only when the person to be authenticated or verified is physically accessible. Thus such technologies are good for applications like Passport Control and fall short of the requirements for IoT applications like an integrated remote-healthcare where different types of users like Doctors, patients, hospitals, insurance companies, other care-givers and even authorized civic-body administrators are to be continually authenticated from remote locations. It is important to ensure that the desired services are accessed only by a legitimate user and no one else. In this paper, we address these issues by proposing a modular solution using key-stroke based biometrics.
引用
收藏
页数:4
相关论文
共 14 条
[1]   Biometric Recognition Based on Free-Text Keystroke Dynamics [J].
Ahmed, Ahmed A. ;
Traore, Issa .
IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (04) :458-472
[2]   User authentication through typing biometrics features [J].
Araújo, LCF ;
Sucupira, LHR ;
Lizárraga, MG ;
Ling, LL ;
Yabu-Uti, JBT .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :851-855
[3]   On the discriminability of keystroke feature vectors used in fixed text keystroke authentication [J].
Balagani, Kiran S. ;
Phoha, Vir V. ;
Ray, Asok ;
Phoha, Shashi .
PATTERN RECOGNITION LETTERS, 2011, 32 (07) :1070-1080
[4]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[5]  
Bhattasali T, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P380, DOI 10.1109/ICACCI.2014.6968594
[6]  
Chaki R., 2014, J MED INFORM TECHNOL, V23, P131
[7]  
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[8]  
Jain K., 2001, IEEE T INF FOREN SEC, V1, P125
[9]   Clustering Uncertain Data Using Voronoi Diagrams and R-Tree Index [J].
Kao, Ben ;
Lee, Sau Dan ;
Lee, Foris K. F. ;
Cheung, David Wai-lok ;
Ho, Wai-Shing .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (09) :1219-1233
[10]  
Karnan M., 2011, ELSEVIER J APPL SOFT, V11, P1515