Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets
نویسندگان
چکیده
The mobile communications industry will experience an evolutionary step within the next two years with the introduction of third generation mobile networks, completing the handset transition from a purely telephony device of the first generation analogue networks into a multimedia multi-purpose mobile communications tool. The ability of these new handsets to store and access sensitive information such as financial records, digital certificates and company records in association with a large handset penetration (864 million subscribers) makes them a desirable target for impostors. The authentication technique for current mobile phones has many weaknesses from a technological and subscriber perspective, and as such non-intrusive and stronger subscriber authentication techniques are required. This study investigates the plausibility of one such technique that of keystroke analysis, comparing and contrasting a number of pattern recognition and neural network based approaches to classification. It was found that neural network-based approaches performed substantially better than the pattern recognition-based approaches with false acceptance and false rejection rates of 3.2%.
منابع مشابه
Application of keystroke analysis to mobile text messaging
The ability to verify the identity of a mobile subscriber will become increasingly important as the services and information that can be accessed by a cellular handset becomes more wide-ranging and sensitive. Current user authentication for mobile handsets is provided by the Personal Identification Number (PIN), which has a number of inherent weaknesses, such as users writing them down, telling...
متن کاملDeployment of Keystroke Analysis on a Smartphone
The current security on mobile devices is often limited to the Personal Identification Number (PIN), a secretknowledge based technique that has historically demonstrated to provide ineffective protection from misuse. Unfortunately, with the increasing capabilities of mobile devices, such as online banking and shopping, the need for more effective protection is imperative. This study proposes th...
متن کاملTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...
متن کاملKeystroke Analysis for Thumb-based Keyboards on Mobile Devices
The evolution of mobile networking has opened the door to a wide range of service opportunities for mobile devices, increasing at the same time the sensitivity of the information stored and access through them. Current PINbased authentication has proved to be an insufficient and an inconvenient approach. Biometrics have proven to be a reliable approach to identity verification and can provide a...
متن کاملKeystroke dynamics on a mobile handset: a feasibility study
With the introduction of third generation phones, a technological transition is occurring in which the devices begin to have similar functionality to that of current personal digital assistants. The ability of these phones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. Current security for mobile p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003