2020
DOI: 10.1109/access.2020.3008019
|View full text |Cite
|
Sign up to set email alerts
|

A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics

Abstract: The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research proposed a three-step authentication model that could be used to authenticate a user who is using the mobile in sitting, walking, and relaxing position. Furthermore… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 47 publications
1
15
0
Order By: Relevance
“…Recently, several studies have applied keystroke dynamics-based authentication in various environments. These include studies based on keystroke dynamics from free text, in contrast to other work that utilized fixed length elements, such as passwords or PINs [ 10 , 11 ], as well as research that continuously classifies the user’s keystroke dynamics [ 11 , 12 , 13 ] and studies that consider various typing positions, such as sitting, walking, and relaxing positions [ 14 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, several studies have applied keystroke dynamics-based authentication in various environments. These include studies based on keystroke dynamics from free text, in contrast to other work that utilized fixed length elements, such as passwords or PINs [ 10 , 11 ], as well as research that continuously classifies the user’s keystroke dynamics [ 11 , 12 , 13 ] and studies that consider various typing positions, such as sitting, walking, and relaxing positions [ 14 ].…”
Section: Related Workmentioning
confidence: 99%
“…In order to allow most data (i.e., about 95% data) of the normal user to be classified as data from the normal user, the sum of the mean of the calculated values above, mean_distance, and their standard deviation, std_distance, multiplied by 2 was set as the threshold. The threshold value was calculated using the following Equation (14).…”
mentioning
confidence: 99%
“…Multiple works on image and pattern analysis-based handwriting recognition and person identification have been reported. Saini et al in [5], proposed a three-step biometric authentication model based on sitting, walking, and relaxing patterns using mobile devices. Here, Random Forest and KNN are used for classification.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Phishing attack is another well-known threat to authentication using text passwords (Agaste et al, 2020), as a user might be convinced to use a phoney website and enter their login cardinalities.As depicted in Figure 1, authentication techniques can be categorized into three main categories, namely: (i) knowledge-based authentication, (ii) token-based authentication, and (ii) biometric-based authentication. In fact, biometric-based authentication is considered the securest and most reliable authentication technique since it depends on the personal characteristic of the end-user only (Saini et al, 2020). The widespread biometric methods utilized in authentication are scanning the fingerprint (Chanukya&Thivakaran, 2020), scanning retina (Srivastava, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…scanning face (Pramana et al, 2020), keystroke (Pramana et al, 2020). However, scanning the retina and figure are the most widely used biometric method being in authentication using smartphones (Saini et al, 2020).…”
Section: Introductionmentioning
confidence: 99%