A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics

The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data co...

Full description

Bibliographic Details
Main Authors: Baljit Singh Saini, Parminder Singh, Anand Nayyar, Navdeep Kaur, Kamaljit Singh Bhatia, Shaker El-Sappagh, Jong-Wan Hu
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9139213/
id doaj-47cc634664ff46f1b6282b3c2a88c5d8
record_format Article
spelling doaj-47cc634664ff46f1b6282b3c2a88c5d82021-03-30T02:18:21ZengIEEEIEEE Access2169-35362020-01-01812590912592210.1109/ACCESS.2020.30080199139213A Three-Step Authentication Model for Mobile Phone User Using Keystroke DynamicsBaljit Singh Saini0https://orcid.org/0000-0001-5649-4255Parminder Singh1https://orcid.org/0000-0002-0750-6309Anand Nayyar2https://orcid.org/0000-0002-9821-6146Navdeep Kaur3Kamaljit Singh Bhatia4Shaker El-Sappagh5https://orcid.org/0000-0001-9705-1477Jong-Wan Hu6https://orcid.org/0000-0001-6081-4469School of Computer Science and Engineering, Lovely Professional University, Phagwara, IndiaSchool of Computer Science and Engineering, Lovely Professional University, Phagwara, IndiaGraduate School, Duy Tan University, Da Nang, VietnamDepartment of Computer Science and Engineering, Sri Guru Granth Sahib World University (SGGSWU), Fatehgarh Sahib, IndiaDepartment of Electronics and Communication Engineering, Govind Ballabh Pant Institute of Engineering & Technology, Ghurdauri, Pauri, IndiaCentro Singular de Investigación en Tecnoloxías Intelixentes (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, SpainDepartment of Civil and Environmental Engineering, Incheon National University, Incheon, South KoreaThe use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research proposed a three-step authentication model that could be used to authenticate a user who is using the mobile in sitting, walking, and relaxing position. Furthermore, the mobile orientation (portrait and landscape) was considered while taking input from the user. Apart from using traditional keystroke features, accelerometer data were also combined for classification using Random Forest(RF) and K-Nearest Neighbour(KNN) classifiers. The three-step authentication method was able to authenticate a user with an EER of 2.9% for the relaxing landscape position. Finally, the model was optimized using Particle Swarm Optimization (PSO) to reduce the feature set and make the model more practical for mobile phones. Optimization helped to reduce the number of features from 55 to 17 and improved the EER to 2.2%. The research validated that relaxing and walking positions are the best positions to authenticate a user using keystroke dynamics.https://ieeexplore.ieee.org/document/9139213/Three-step authenticationoptimizationparticle swarm optimizationrandom forestparticle swarm optimization (PSO)
collection DOAJ
language English
format Article
sources DOAJ
author Baljit Singh Saini
Parminder Singh
Anand Nayyar
Navdeep Kaur
Kamaljit Singh Bhatia
Shaker El-Sappagh
Jong-Wan Hu
spellingShingle Baljit Singh Saini
Parminder Singh
Anand Nayyar
Navdeep Kaur
Kamaljit Singh Bhatia
Shaker El-Sappagh
Jong-Wan Hu
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
IEEE Access
Three-step authentication
optimization
particle swarm optimization
random forest
particle swarm optimization (PSO)
author_facet Baljit Singh Saini
Parminder Singh
Anand Nayyar
Navdeep Kaur
Kamaljit Singh Bhatia
Shaker El-Sappagh
Jong-Wan Hu
author_sort Baljit Singh Saini
title A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
title_short A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
title_full A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
title_fullStr A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
title_full_unstemmed A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
title_sort three-step authentication model for mobile phone user using keystroke dynamics
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research proposed a three-step authentication model that could be used to authenticate a user who is using the mobile in sitting, walking, and relaxing position. Furthermore, the mobile orientation (portrait and landscape) was considered while taking input from the user. Apart from using traditional keystroke features, accelerometer data were also combined for classification using Random Forest(RF) and K-Nearest Neighbour(KNN) classifiers. The three-step authentication method was able to authenticate a user with an EER of 2.9% for the relaxing landscape position. Finally, the model was optimized using Particle Swarm Optimization (PSO) to reduce the feature set and make the model more practical for mobile phones. Optimization helped to reduce the number of features from 55 to 17 and improved the EER to 2.2%. The research validated that relaxing and walking positions are the best positions to authenticate a user using keystroke dynamics.
topic Three-step authentication
optimization
particle swarm optimization
random forest
particle swarm optimization (PSO)
url https://ieeexplore.ieee.org/document/9139213/
work_keys_str_mv AT baljitsinghsaini athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT parmindersingh athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT anandnayyar athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT navdeepkaur athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT kamaljitsinghbhatia athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT shakerelsappagh athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT jongwanhu athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT baljitsinghsaini threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT parmindersingh threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT anandnayyar threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT navdeepkaur threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT kamaljitsinghbhatia threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT shakerelsappagh threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
AT jongwanhu threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics
_version_ 1724185398056321024