Advanced user authentication for mobile devices

被引:78
作者
Clarke, N. L. [1 ]
Furnell, S. M. [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
关键词
keystroke analysis; user authentication; biometrics; mobility; composite authentication;
D O I
10.1016/j.cose.2006.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. An issue that has traditionally been poorly served is user authentication, with the majority of devices relying upon problematic secret knowledge approaches. This paper proposes the use of more advanced biometric methods as an alternative. After considering the general range of available techniques and their applicability to mobile devices, the discussion focuses upon the concept of keystroke analysis. Results of a practical evaluation are presented based upon the entry of both telephone numbers and text messages on a mobile phone. The findings reveal the technique to have promise for certain users with average error rates below 5%. The paper then proceeds to explain how the accuracy could be further improved by incorporating keystroke analysis within a composite authentication mechanism that utilises a portfolio of authentication techniques to provide robust, accurate and transparent authentication of the user. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:109 / 119
页数:11
相关论文
共 23 条
[1]  
ASHBOURNE J, 2000, BIOMETRIC ADV IDENTI
[2]  
*BIOPASSWORD, 2005, BIOP KEYSTR DYN APPR
[3]  
Bishop CM., 1995, Neural networks for pattern recognition
[4]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[5]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[6]  
CLARKE N, 2003, USING KEYSTROKE ANAL, P97
[7]  
CLARKE N, 2004, THESIS U PLYMOUTH UK
[8]  
COPE B, 1990, ELECTROTECHNOLOG APR, P71
[9]  
Denning D., 1999, Information Warfare and Security
[10]  
Haykin S., 1999, Neural networks: a comprehensive foundation, V2nd ed.