Advanced user authentication for mobile devices

被引:78
作者
Clarke, N. L. [1 ]
Furnell, S. M. [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
关键词
keystroke analysis; user authentication; biometrics; mobility; composite authentication;
D O I
10.1016/j.cose.2006.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. An issue that has traditionally been poorly served is user authentication, with the majority of devices relying upon problematic secret knowledge approaches. This paper proposes the use of more advanced biometric methods as an alternative. After considering the general range of available techniques and their applicability to mobile devices, the discussion focuses upon the concept of keystroke analysis. Results of a practical evaluation are presented based upon the entry of both telephone numbers and text messages on a mobile phone. The findings reveal the technique to have promise for certain users with average error rates below 5%. The paper then proceeds to explain how the accuracy could be further improved by incorporating keystroke analysis within a composite authentication mechanism that utilises a portfolio of authentication techniques to provide robust, accurate and transparent authentication of the user. (c) 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:109 / 119
页数:11
相关论文
共 23 条
[11]   IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J].
JOYCE, R ;
GUPTA, G .
COMMUNICATIONS OF THE ACM, 1990, 33 (02) :168-176
[12]  
KUNG Y, 2005, BIOMETRIC AUTHENTICA
[13]   VERIFYING IDENTITY VIA KEYSTROKE CHARACTERISTICS [J].
LEGGETT, J ;
WILLIAMS, G .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1988, 28 (01) :67-76
[14]   Personal identification based on iris texture analysis [J].
Ma, L ;
Tan, T ;
Wang, YH ;
Zhang, DX .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (12) :1519-1533
[15]  
*MOB DAT ASS, UK TEXT MESS TOT TOP
[16]  
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[17]   Keystroke dynamics as a biometric for authentication [J].
Monrose, F ;
Rubin, AD .
FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) :351-359
[18]  
Nanavati S, 2002, BIOMETRICS IDENTITY
[19]   KEYBOARD USER VERIFICATION - TOWARD AN ACCURATE, EFFICIENT, AND ECOLOGICALLY VALID ALGORITHM [J].
NAPIER, R ;
LAVERTY, W ;
MAHAR, D ;
HENDERSON, R ;
HIRON, M ;
WAGNER, M .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 1995, 43 (02) :213-222
[20]   A MULTILAYER NEURAL-NETWORK SYSTEM FOR COMPUTER ACCESS SECURITY [J].
OBAIDAT, MS ;
MACCHAIROLO, DT .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1994, 24 (05) :806-813