A Systematic Literature Review on Latest Keystroke Dynamics Based Models

被引:10
作者
Roy, Soumen [1 ]
Pradhan, Jitesh [2 ]
Kumar, Abhinav [2 ]
Adhikary, Dibya Ranjan Das [2 ]
Roy, Utpal [3 ]
Sinha, Devadatta [1 ]
Pal, Rajat Kumar [1 ]
机构
[1] Univ Calcutta, Dept Comp Sci & Engn, Acharya Prafulla Chandra Roy Siksha Prangan, Kolkata 700106, India
[2] Siksha O Anusandhan Univ, Dept Comp Sci & Engn, Bhubaneswar 751030, Odisha, India
[3] Visva Bharati, Dept Comp Syst Sci, Santini Ketan 731235, W Bengal, India
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Authentication; Biometrics (access control); Passwords; Behavioral sciences; Security; Knowledge based systems; Keystroke dynamics; Identification of persons; Behavioural biometrics; computer security; keystroke dynamics; trait prediction; typing patterns; user authentication; user identification; CONTINUOUS AUTHENTICATION; USER AUTHENTICATION; BIOMETRIC AUTHENTICATION; PERFORMANCE EVALUATION; IDENTIFICATION; VERIFICATION; SMARTPHONES; PASSWORD; FUSION; SENSOR;
D O I
10.1109/ACCESS.2022.3197756
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of this study is to conduct a comprehensive evaluation and analysis of the most recent studies on the implications of keystroke dynamics (KD) patterns in user authentication, identification, and the determination of useful information. Another aim is to provide an extensive and up-to-date survey of the recent literature and potential research directions to understand the present state-of-the-art methodologies in this particular domain that are expected to be beneficial for the KD research community. From January 1st, 2017 to March 13th, 2022, the popular six electronic databases have been searched using a search criterion ("keystroke dynamics" OR "typing pattern") AND ("authentication" OR "verification" OR "identification"). With this criterion, a total of nine thousand three hundred forty-eight results, including duplicates, were produced. However, one thousand five hundred forty-seven articles have been chosen after removing duplicates and preliminary screening. Due to insufficient information, only one hundred twenty-seven high-quality quantitative research articles have been included in the article selection process. We compared and summarised several factors with multiple tables to comprehend the various methodologies, experimental settings, and findings. In this study, we have identified six unique KD-based designs and presented the status of findings toward an effective solution in authentication, identification, and prediction. We have also discovered considerable heterogeneity across studies in each KD-based design for desktops and smartphones separately. Finally, this paper found a few open research challenges and provided some indications for a deeper understanding of the issues and further study.
引用
收藏
页码:92192 / 92236
页数:45
相关论文
共 392 条
[1]  
Abinaya R., 2021, MATER TODAY-PROC, P1, DOI [10.1016/j.matpr.2021.01.733, DOI 10.1016/J.MATPR.2021.01.733]
[2]   AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors [J].
Abuhamad, Mohammed ;
Abuhmed, Tamer ;
Mohaisen, David ;
Nyang, DaeHun .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :5008-5020
[3]   A Usable and Robust Continuous Authentication Framework Using Wearables [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Akkaya, Kemal .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (06) :2140-2153
[4]   A privacy-preserving multifactor authentication system [J].
Acar, Abbas ;
Liu, Wenyi ;
Beyah, Raheem ;
Akkaya, Kemal ;
Uluagac, Arif Selcuk .
SECURITY AND PRIVACY, 2019, 2 (05)
[5]   WACA: Wearable-Assisted Continuous Authentication [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Akkaya, Kemal .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :264-269
[6]  
Acien A., 2019, P 1 INT WORKSH MULT, P53, DOI DOI 10.1145/3347450.3357663
[7]  
Al-Jarrah M. M., 2019, PROC 2 INT C SIGNAL, P1
[8]  
Alariki A., 2016, INT J APPL ENG RES, V11, P9331
[9]   Dynamic Authentication of Smartphone Users Based on Touchscreen Gestures [J].
Alghamdi, Shatha J. ;
Elrefaei, Lamiaa A. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :789-810
[10]   User Behaviour-Based Mobile Authentication System [J].
Ali, Adnan Bin Amanat ;
Ponnusamy, Vasaki ;
Sangodiah, Anbuselvan .
ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, IC4S 2018, 2019, 924 :461-472