Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018 (2018), Article ID 2567463, 10 pages
https://doi.org/10.1155/2018/2567463
Research Article

Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors

1Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea
2Electronics and Telecommunications Research Institute, Daejeon 34113, Republic of Korea
3Information Security Engineering, University of Science and Technology, Daejeon 34113, Republic of Korea

Correspondence should be addressed to Ji Sun Shin; moc.liamg@gnojes.nihssj

Received 3 November 2017; Revised 19 January 2018; Accepted 13 February 2018; Published 14 March 2018

Academic Editor: Amir Anees

Copyright © 2018 Hyungu Lee et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Statista, “Number of smartphone users in the U.S. 2010-2022,” https://www.statista.com/statistics/201182/forecast-of-smartphone-users-in-the-us/.
  2. Statista, Number of smartphone users in South Korea from 2015 to 2022, https://www.statista.com/statistics/467171/forecast-of-smartphone-users-in-south-korea/.
  3. N. Ben-Asher, N. Kirschnick, H. Sieger, J. Meyer, A. Ben-Oved, and S. Möller, “On the need for different security methods on mobile phones,” in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 465–473, ACM, Stockholm, Sweden, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. P. K. Sari, G. S. Ratnasari, and A. Prasetio, “An evaluation of authentication methods for smartphone based on users’ preferences,” in Proceedings of the IOP Conference Series: Materials Science and Engineering, vol. 128, IOP Publishing, Bristol, UK, 2016.
  5. N. Zheng, K. Bai, H. Huang, and H. Wang, “You are how you touch: user verification on smartphones via tapping behaviors,” in Proceedings of the IEEE 22nd International Conference on Network Protocols (ICNP '14), pp. 221–232, IEEE, North Carolina, NC, USA, October 2014. View at Publisher · View at Google Scholar
  6. T.-Y. Chang, C.-J. Tsai, and J.-H. Lin, “A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices,” The Journal of Systems and Software, vol. 85, no. 5, pp. 1157–1165, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. T. Samura, M. Izumi, and H. Nishimura, “Flick input authentication in Japanese free text entry on smartphones,” in Proceedings of the 53rd Annual Conference of the Society of Instrument and Control Engineers of Japan, SICE '14, pp. 1348–1353, 2014.
  8. N. L. Clarke, S. M. Furnell, B. M. Lines, and P. L. Reynolds, “Keystroke dynamics on a mobile handset: a feasibility study,” Information Management and Computer Security, vol. 11, no. 4, pp. 161–166, 2003. View at Publisher · View at Google Scholar · View at Scopus
  9. N. L. Clarke and S. M. Furnell, “Authenticating mobile phone users using keystroke analysis,” International Journal of Information Security, vol. 6, no. 1, pp. 1–14, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. I. De Mendizabal-Vázquez, D. De Santos-Sierra, J. Guerra-Casanova, and C. Sánchez-Ávila, “Supervised classification methods applied to keystroke dynamics through mobile devices,” in Proceedings of the 48th Annual IEEE International Carnahan Conference on Security Technology, ICCST '14, pp. 1–6, October 2014.
  11. C. Giuffrida, K. Majdanik, M. Conti, and H. Bos, “I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics,” in Proceedings of the International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 8550, pp. 92–111, Springer, Cham, Switzerland, 2014.
  12. M. Antal and L. Z. Szabó, “Keystroke Dynamics on Android Platform,” Procedia Technology, vol. 19, pp. 820–826, 2015. View at Publisher · View at Google Scholar
  13. T.-Y. Chang, C.-J. Tsai, W.-J. Tsai, C.-C. Peng, and H.-S. Wu, “A changeable personal identification number-based keystroke dynamics authentication system on smart phones,” Security and Communication Networks, vol. 9, no. 15, pp. 2674–2685, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. J. Wu and Z. Chen, “An implicit identity authentication system considering changes of gesture based on keystroke behaviors,” International Journal of Distributed Sensor Networks, vol. 11, no. 6, Article ID 470274, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Buschek, A. De Luca, and F. Alt, “Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices,” in Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems, CHI '15, pp. 1393–1402, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Dhage, P. Kundra, A. Kanchan, and P. Kap, “Mobile authentication using keystroke dynamics,” in Proceedings of the International Conference on Communication, Information and Computing Technology, ICCICT '15, IEEE, Mumbai, India, January 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Bond and A. E. A. Awad, “Touch-based static authentication using a virtual grid,” in Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 129–134, 2015.
  18. P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “TDAS: a touch dynamics based multi-factor authentication solution for mobile devices,” International Journal of Pervasive Computing and Communications, vol. 12, no. 1, pp. 127–153, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. R. Spillane, “Keyboard apparatus for personal identification,” IBM Technical Disclosure Bulletin, vol. 17, no. 3346, 1975.
  20. G. E. Forsen, M. R. Nelson, and R. J. Staron, “Personal attributes authentication techniques,” Tech. Rep. RADC-TR-77-333, Rome Air Development Center, New York, NY, USA, 1977. View at Google Scholar
  21. R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, “Authentication by keystroke timing: some preliminary results,” Tech. Rep. R-2526-NSF, RAND Corporation, California, Calif, USA, 1980. View at Google Scholar
  22. D. Umphress and G. Williams, “Identity verification through keyboard characteristics,” International Journal of Man-Machine Studies, vol. 23, no. 3, pp. 263–273, 1985. View at Publisher · View at Google Scholar · View at Scopus
  23. N. L. Clarke, S. M. Furnell, B. M. Lines, and P. L. Reynolds, “Subscriber authentication for mobile phones using keystroke dynamics,” in Proceedings of the 3rd International Network Conference (INC '02), 2002.
  24. H. Saevanee and P. Bhattarakosol, “Authenticating user using keystroke dynamics and finger pressure,” in Proceedings of the 6th IEEE Consumer Communications and Networking Conference, CCNC '09, IEEE, Nevada, Nev, USA, January 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Trojahn and F. Ortmeier, “Biometric authentication through a virtual keyboard for smartphones,” International Journal of Computer Science and Information Technology, vol. 4, no. 5, 2012. View at Google Scholar
  26. S. Zahid, M. Shahzad, S. A. Khayam, and M. Farooq, Keystroke-Based User Identification on Smart Phones, Springer, Berlin, Germany, 2009.
  27. Z. Xu, K. Bai, and S. Zhu, “TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors,” in Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113–124, ACM, Arizona, Ariz, USA, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  28. Wikipedia, Support vector machine, https://en.wikipedia.org/wiki/Support_vector_machine.