Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones

作者: Cheng-Jung Tsai , Chun-Cheng Peng , Mao-Lun Chiang , Ting-Yi Chang , Wang-Jui Tsai

DOI: 10.1109/CHINACOM.2014.7054316

关键词:

摘要: Most of subscribers use personal identification number (PIN) codes which combined with 6–8 numbers to protect their Subscriber Identity Module (SIM) cards from illegal accesses. To enhance security, many previous studies have employed keystroke dynamics the PIN code, and relative results exhibit that can indeed improve security a code. However, traditional dynamics-based authentication (KDA) system has collect user's firstly then produce unique biometrics. It's inconvenient for users when changing is required, because corresponding KDA systems be retrained. solve above-mentioned drawbacks, this paper proposes novel technique by change anytime, without any extra retraining. Conducted experiment show proposed approach effectively distinguish legitimate impostors even original passwords.

参考文章(23)
Cheng-Jung Tasia, Ting-Yi Chang, Pei-Cheng Cheng, Jyun-Hao Lin, Two novel biometric features in keystroke dynamics authentication systems for touch screen devices Security and Communication Networks. ,vol. 7, pp. 750- 758 ,(2014) , 10.1002/SEC.776
Rung-Shiang Cheng, Der-Jiunn Deng, Congestion control with dynamic threshold adaptation and cross-layer response for TCP Vegas over IEEE 802.11 wireless networks International Journal of Communication Systems. ,vol. 27, pp. 2918- 2930 ,(2014) , 10.1002/DAC.2515
Rajkumar Janakiraman, Terence Sim, Keystroke dynamics in a general setting international conference on biometrics. pp. 584- 593 ,(2007) , 10.1007/978-3-540-74549-5_62
Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh, Improving keystroke dynamics authentication system via multiple feature fusion scheme Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). pp. 277- 282 ,(2012) , 10.1109/CYBERSEC.2012.6246096
Hyoung-joo Lee, Sungzoon Cho, Retraining a keystroke dynamics-based authenticator with impostor patterns Computers & Security. ,vol. 26, pp. 300- 310 ,(2007) , 10.1016/J.COSE.2006.11.006
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu, Keystroke statistical learning model for web authentication Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 359- 361 ,(2007) , 10.1145/1229285.1229327
N.L. Clarke, S.M. Furnell, B.M. Lines, P.L. Reynolds, Keystroke dynamics on a mobile handset: a feasibility study Information Management & Computer Security. ,vol. 11, pp. 161- 166 ,(2003) , 10.1108/09685220310489526
Chun-Cheng Lin, Jia-Rong Kang, Wan-Yu Liu, Der-Jiunn Deng, Modelling a Nurse Shift Schedule with Multiple Preference Ranks for Shifts and Days-Off Mathematical Problems in Engineering. ,vol. 2014, pp. 1- 10 ,(2014) , 10.1155/2014/937842
S. Hocquet, J.-Y. Ramel, H. Carbot, Estimation of User Specific Parameters in One-class Problems international conference on pattern recognition. ,vol. 4, pp. 449- 452 ,(2006) , 10.1109/ICPR.2006.506
Chun-Cheng Lin, Wan-Yu Liu, Chun-Hung Chou, Der-Jiunn Deng, A Novel Joint Problem of Routing, Scheduling, and Variable-Width Channel Allocation in WMNs The Scientific World Journal. ,vol. 2014, pp. 754749- 754749 ,(2014) , 10.1155/2014/754749