A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics
The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data co...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9139213/ |
id |
doaj-47cc634664ff46f1b6282b3c2a88c5d8 |
---|---|
record_format |
Article |
spelling |
doaj-47cc634664ff46f1b6282b3c2a88c5d82021-03-30T02:18:21ZengIEEEIEEE Access2169-35362020-01-01812590912592210.1109/ACCESS.2020.30080199139213A Three-Step Authentication Model for Mobile Phone User Using Keystroke DynamicsBaljit Singh Saini0https://orcid.org/0000-0001-5649-4255Parminder Singh1https://orcid.org/0000-0002-0750-6309Anand Nayyar2https://orcid.org/0000-0002-9821-6146Navdeep Kaur3Kamaljit Singh Bhatia4Shaker El-Sappagh5https://orcid.org/0000-0001-9705-1477Jong-Wan Hu6https://orcid.org/0000-0001-6081-4469School of Computer Science and Engineering, Lovely Professional University, Phagwara, IndiaSchool of Computer Science and Engineering, Lovely Professional University, Phagwara, IndiaGraduate School, Duy Tan University, Da Nang, VietnamDepartment of Computer Science and Engineering, Sri Guru Granth Sahib World University (SGGSWU), Fatehgarh Sahib, IndiaDepartment of Electronics and Communication Engineering, Govind Ballabh Pant Institute of Engineering & Technology, Ghurdauri, Pauri, IndiaCentro Singular de Investigación en Tecnoloxías Intelixentes (CiTIUS), Universidade de Santiago de Compostela, Santiago de Compostela, SpainDepartment of Civil and Environmental Engineering, Incheon National University, Incheon, South KoreaThe use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research proposed a three-step authentication model that could be used to authenticate a user who is using the mobile in sitting, walking, and relaxing position. Furthermore, the mobile orientation (portrait and landscape) was considered while taking input from the user. Apart from using traditional keystroke features, accelerometer data were also combined for classification using Random Forest(RF) and K-Nearest Neighbour(KNN) classifiers. The three-step authentication method was able to authenticate a user with an EER of 2.9% for the relaxing landscape position. Finally, the model was optimized using Particle Swarm Optimization (PSO) to reduce the feature set and make the model more practical for mobile phones. Optimization helped to reduce the number of features from 55 to 17 and improved the EER to 2.2%. The research validated that relaxing and walking positions are the best positions to authenticate a user using keystroke dynamics.https://ieeexplore.ieee.org/document/9139213/Three-step authenticationoptimizationparticle swarm optimizationrandom forestparticle swarm optimization (PSO) |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Baljit Singh Saini Parminder Singh Anand Nayyar Navdeep Kaur Kamaljit Singh Bhatia Shaker El-Sappagh Jong-Wan Hu |
spellingShingle |
Baljit Singh Saini Parminder Singh Anand Nayyar Navdeep Kaur Kamaljit Singh Bhatia Shaker El-Sappagh Jong-Wan Hu A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics IEEE Access Three-step authentication optimization particle swarm optimization random forest particle swarm optimization (PSO) |
author_facet |
Baljit Singh Saini Parminder Singh Anand Nayyar Navdeep Kaur Kamaljit Singh Bhatia Shaker El-Sappagh Jong-Wan Hu |
author_sort |
Baljit Singh Saini |
title |
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics |
title_short |
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics |
title_full |
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics |
title_fullStr |
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics |
title_full_unstemmed |
A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics |
title_sort |
three-step authentication model for mobile phone user using keystroke dynamics |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research proposed a three-step authentication model that could be used to authenticate a user who is using the mobile in sitting, walking, and relaxing position. Furthermore, the mobile orientation (portrait and landscape) was considered while taking input from the user. Apart from using traditional keystroke features, accelerometer data were also combined for classification using Random Forest(RF) and K-Nearest Neighbour(KNN) classifiers. The three-step authentication method was able to authenticate a user with an EER of 2.9% for the relaxing landscape position. Finally, the model was optimized using Particle Swarm Optimization (PSO) to reduce the feature set and make the model more practical for mobile phones. Optimization helped to reduce the number of features from 55 to 17 and improved the EER to 2.2%. The research validated that relaxing and walking positions are the best positions to authenticate a user using keystroke dynamics. |
topic |
Three-step authentication optimization particle swarm optimization random forest particle swarm optimization (PSO) |
url |
https://ieeexplore.ieee.org/document/9139213/ |
work_keys_str_mv |
AT baljitsinghsaini athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT parmindersingh athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT anandnayyar athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT navdeepkaur athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT kamaljitsinghbhatia athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT shakerelsappagh athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT jongwanhu athreestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT baljitsinghsaini threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT parmindersingh threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT anandnayyar threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT navdeepkaur threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT kamaljitsinghbhatia threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT shakerelsappagh threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics AT jongwanhu threestepauthenticationmodelformobilephoneuserusingkeystrokedynamics |
_version_ |
1724185398056321024 |