39
Views
3
CrossRef citations to date
0
Altmetric
Articles

Analyzing user typing behaviour in different positions using keystroke dynamics for mobile phones

, , &

References

  • J. Ligon and V. Abhishek, “Keystroke Dynamics.” Biometrics in a Data Driven World: Trends, Technologies, and Challenges, pp. 329-336, (2016).
  • S. Bleha, C. Slivinsky, and B. Hussien, “Computer-access security systems using keystroke dynamics,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, no. 12, pp. 1217–1222, (1990). doi: 10.1109/34.62613
  • N. L. Clarke, S. M. Furnell, and P. L. Reynolds, “Biometric authentication for mobile devices,” in Proc. 3rd Australian Inf.Warfare and Security Conf., pp. 61–69 (2002).
  • P. Campisi, E. Maiorana, M. L. Bosco, and A. Neri, “User authentication using keystroke dynamics for cellular phones,” IET Signal Processing, vol. 3, no. 4, pp. 333–341, (2009). doi: 10.1049/iet-spr.2008.0171
  • F. Alshanketi, I. Traore, and A. A. Ahmed, “Improving performance and usability in mobile keystroke dynamic biometric authentication,” in IEEE Proc. Security and Privacy Workshops (SPW), pp. 66– 73 (2016).
  • Z. Sitova, J. Sedenka, Q. Yang, G. Peng, G. Zhou, P. Gasti, and K. Balagani, “HMOG: A new biometric modality for continuous authentication of smartphone users,” IEEE Transactions Information Forensics and Security, vol. 1, no.1, pp. 1-17, (2016).
  • H. Crawford and E. Ahmadzadeh, “Authentication on the go: assessing the effect of movement on mobile device keystroke dynamics,” in 13thSymposium on Usable Privacy and Security, pp. 163–173 (2017).
  • J. H. Roh, S. H. Lee, and S. Kim, “Keystroke dynamics for authentication in smartphone,” in IEEE Proc. Int. Conf. Information and Communication Technology Convergence (ICTC), pp. 1155–1159 (2016).
  • C. Shen, T. Yu, S. Yuan, Y. Li, and X. Guan, “Performance analysis of motion-sensor behavior for user authentication on smartphones,” Sensors, vol. 16, no. 3, pp. 345, (2016). doi: 10.3390/s16030345
  • K. S. Balagani, V. V. Phoha, A. Ray, and S. Phoha, “On the discriminability of keystroke feature vectors used in fixed text keystroke authentication,” Pattern Recognition Letters, vol. 32, no. 7, pp. 1070–1080, (2011). doi: 10.1016/j.patrec.2011.02.014
  • U. Roy, S. Devadatta, and R. Soumen, “User authentication: Keystroke dynamics with soft biometric features,” Internet of Things (IoT), pp. 123-142, (2017).
  • Andrews, Leo John Baptist, and Linesh Raja. “Remote based patient monitoring system using wearable sensors through online and offline mode for android based mobile platforms.” 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS). IEEE, (2017).
  • F. Bergadano, D. Gunetti, and C. Picardi, “User authentication through keystroke dynamics,” ACM Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 367–397, (2002). doi: 10.1145/581271.581272
  • S. S. Hwang, H. J. Lee, and S. Cho, “Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication,” Expert Systems with Applications, vol. 36, no. 7, pp. 10 649–10 656, (2009). doi: 10.1016/j.eswa.2009.02.075
  • K. S. Killourhy, “A scientific understanding of keystroke dynamics,” Carnegie Inst. Of Tech. Pittsburgh, Dept. of Computer Science, Tech. Rep., (2012).
  • P. Bours, “Continuous keystroke dynamics: A different perspective towards biometric evaluation,” Information Security Technical Report, vol. 17, no. 1-2, pp. 36–43, (2012). doi: 10.1016/j.istr.2012.02.001
  • Eswaraprasad, Ramkumar, and Linesh Raja. “Improved intelligent transport system for reliable traffic control management by adapting internet of things.” 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS). IEEE, (2017).
  • R. Young, S. Randall, L. Jeffrey and P. Isaac,”Keystroke Dynamics: Establishing Keyprints to Verify Users in Online Courses.” Computers in the Schools, vol. 20, no. 1, pp. 48-68, (2019). doi: 10.1080/07380569.2019.1565905
  • Durugkar, Santosh, and Ramesh C. Poonia. “Optimum utilization of natural resources for home garden using wireless sensor networks.” Journal of Information and Optimization Sciences 38.6: 1077-1085 (2017). doi: 10.1080/02522667.2017.1380391
  • A. Buchoux and N. L. Clarke, “Deployment of keystroke analysis on a smartphone,” in Australian Inf. Security Management Conf., pp. 48 (2008).
  • M. Antal, L. Z. Szabó, and I. László, “Keystroke dynamics on android platform,” Procedia Technology, vol. 19, pp. 820–826, (2015). doi: 10.1016/j.protcy.2015.02.118
  • Raja, Linesh, and Sonali Vyas. “The Study of Technological Development in the Field of Smart Farming.” Smart Farming Technologies for Sustainable Agricultural Development. IGI Global, 2019. 1-24.
  • B. S. Saini, N. Kaur and K. Bhatia, “Authenticating Mobile Phone Users Based on Their Typing Position Using Keystroke Dynamics,” In Proc. 2nd Int. Conf. Communication, Computing and Networking, pp.25-33 (2019).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.