Keystroke-Based User Identification on Smart Phones

نویسندگان

  • Saira Zahid
  • Muhammad Shahzad
  • Syed Ali Khayam
  • Muddassar Farooq
چکیده

Smart phones are now being used to store users’ identities and sensitive information/data. Therefore, it is important to authenticate legitimate users of a smart phone and to block imposters. In this paper, we demonstrate that keystroke dynamics of a smart phone user can be translated into a viable features’ set for accurate user identification. To this end, we collect and analyze keystroke data of 25 diverse smart phone users. Based on this analysis, we select six distinguishing keystroke features that can be used for user identification. We show that these keystroke features for different users are diffused and therefore a fuzzy classifier is well-suited to cluster and classify them. We then optimize the front-end fuzzy classifier using Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) as back-end dynamic optimizers to adapt to variations in usage patterns. Finally, we provide a novel keystroke dynamics based PIN (Personal Identification Number) verification mode to ensure information security on smart phones. The results of our experiments show that the proposed user identification system has an average error rate of 2% after the detection mode and the error rate of rejecting legitimate users drops to zero in the PIN verification mode. We also compare error rates (in terms of detecting both legitimate users and imposters) of our proposed classifier with 5 existing state-of-the-art techniques for user identification on desktop computers. Our results show that the proposed technique consistently and considerably outperforms

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Keystroke dynamics on a mobile handset: a feasibility study

With the introduction of third generation phones, a technological transition is occurring in which the devices begin to have similar functionality to that of current personal digital assistants. The ability of these phones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. Current security for mobile p...

متن کامل

Familiarity and application of smart technologies on customer relationship management

Aim: The purpose of the study is to examine familiarity and application of smart technologies {Radio-frequency identification (RFID),  Quick Response code(QR),    Near-Field-Communication Mobile (NFC)} on customer relationship management (CRM). Methodology: An applied study collecting data via Stokić, Stojanović, Bogdanović, Despotović-Zrakić, Radenković questionnaire. Population consisted of 1...

متن کامل

سیستم پیشنهاد دهنده زمینه‌آگاه برای انتخاب گوشی تلفن همراه با ترکیب روش‌های تصمیم‌گیری جبرانی و غیرجبرانی

Recommender systems suggest proper items to customers based on their preferences and needs. Needed time to search is reduced and the quality of customer’s choice is increased using recommender systems. The context information like time, location and user behaviors can enhance the quality of recommendations and customer satisfication in such systems. In this paper a context aware recommender sys...

متن کامل

Generalized Eyes-free Interaction for Use with Large Displays

Smart phones and tablet computers are becoming increasingly ubiquitous and powerful. They can serve as replacements for currently used input devices, and provide novel functionality not achieved with traditional devices. Furthermore, their ubiquity ensures that they scale well to multi-user environments, where users can use their own devices. Several attempts have already been made to use smart...

متن کامل

Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones

With hundreds of millions using computers and mobile devices all over the globe, these devices have an established position in modern society. Nevertheless, most of these devices use weak authentication techniques with passwords and PINs which can be easily hacked. Thus, stronger identification is needed to ensure data security and privacy. In this paper, we will explain the employment of biome...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009