A User Authentication Scheme Using Keystrokes for Smartphones while Moving

被引:0
|
作者
Takahashi, Hiroya [1 ]
Ogura, Kanayo [1 ]
Bista, Bhed Bahadur [1 ]
Takata, Toyoo [1 ]
机构
[1] Iwate Prefectural Univ, Fac Software & Informat Sci, 152-52 Sugo, Takizawa, Iwate 0200693, Japan
来源
PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016) | 2016年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, smartphones are so diffusing that they are indispensable in our daily life. They store various types of personal information and are used for sensitive applications such as electronic commerce or personal banking. Therefore, they are an easy target for criminals. One of important countermeasures against smartphone attacks is authentication and various authentication schemes has been proposed. One such scheme is a keystroke dynamics, which is a kind of biometrics. However, there is no literature to discuss with smartphone authentication using keystrokes while moving (walking, by car, and so on). The aim of this paper is to clarify that, by fully utilizing built-in sensors (touch screen, orientation, rotation, and so on) in smartphones, what combination of such sensor outputs and which matching algorithm for sensor metrics are the optimal for authentication while moving. We implement a prototype system in an Android smartphone and evaluate equal-error rate (EER) for it in real moving environment, that is, with walking and in a moving car. As a result, we firstly found that the EERs were unexpectedly good; it was comparatively the same with static situation.
引用
收藏
页码:310 / 314
页数:5
相关论文
共 50 条
  • [31] An enhanced remote user authentication scheme using smart cards
    Awasthi, AK
    Lal, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 583 - 586
  • [32] Secure remote user authentication scheme using bilinear pairings
    Yoon, Eun-Jun
    Lee, Wan-Soo
    Yoo, Kee-Young
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 102 - +
  • [33] Efficient remote user authentication scheme using smart card
    Lu, RX
    Cao, ZF
    COMPUTER NETWORKS, 2005, 49 (04) : 535 - 540
  • [34] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993
  • [35] A remote user authentication scheme using strong graphical passwords
    Ku, WC
    Tsaur, MJ
    LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 351 - 355
  • [36] A novel remote user authentication scheme using bilinear pairings
    Das, Manik Lal
    Saxena, Ashutosh
    Gulati, Ved P.
    Phatak, Deepak B.
    COMPUTERS & SECURITY, 2006, 25 (03) : 184 - 189
  • [37] A Robust Remote User Authentication Scheme Using Smart Card
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 7 - 11
  • [38] A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
    Li, Chun-Ta
    Lee, Cheng-Chi
    INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 236 - 245
  • [39] Advance remote user authentication scheme using smart card
    Kumar S.
    Singh V.
    Sharma V.
    Singh V.P.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 957 - 971
  • [40] New remote user authentication scheme using smart cards
    Kumar, M
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 597 - 600