CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Authenticating Device Users via Keyboard Strokes

by Olusola Gbenga Olufemi, Rukayat Damilola Alimi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 17
Year of Publication: 2020
Authors: Olusola Gbenga Olufemi, Rukayat Damilola Alimi
10.5120/ijca2020920673

Olusola Gbenga Olufemi, Rukayat Damilola Alimi . Authenticating Device Users via Keyboard Strokes. International Journal of Computer Applications. 175, 17 ( Sep 2020), 4-11. DOI=10.5120/ijca2020920673

@article{ 10.5120/ijca2020920673,
author = { Olusola Gbenga Olufemi, Rukayat Damilola Alimi },
title = { Authenticating Device Users via Keyboard Strokes },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 17 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 4-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number17/31542-2020920673/ },
doi = { 10.5120/ijca2020920673 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:16.501752+05:30
%A Olusola Gbenga Olufemi
%A Rukayat Damilola Alimi
%T Authenticating Device Users via Keyboard Strokes
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 17
%P 4-11
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The present-day world is filled with numerous valuable personal digital devices that need to be well safe-guarded. To see ample of U.S populace still suffering in the hands of impostors and fraudsters of different kinds, despite technological advancement in such great nation is worrisome. Other nations are not spared of this security menace and perpetrators. Cases of break-in of keyboard embedded or plugged-in devices become alarming day-in-day-out [8]. Many authentication mechanisms’ failures in vital devices like smartphones, tablets and laptops have been reported recently. PIN, which stands for Personal Identification Numbers and pattern drawing have been used frequently as authentication methods, especially on devices that use keyboards [6]. However, these devices are still susceptible to shoulder surfing occurrence [6]. Alternatively, keystroke dynamics which authenticates genuine owners of these devices, based on their typing manner has been studied for many years, but less utilized in these very important gadgets. Keystroke dynamics can help more in reducing these authentication problems being faced by these owners, by examining the password typed or patterns made, more essentially with how a user types (the time speed and all others) [6].

References
  1. Kevin S. Killourhy, Roy A. Maxion. 2009. Comparing Anomaly-Detection Algorithms for Keystroke Dynamics. In Proceedings of the 39th Annual International Conference on Dependable Systems and Networks (DSN-2009). IEEE Computer Society Press
  2. Petr Svenda. 2001. Keystroke Dynamics Masaryk University, P018 - term project, 2001
  3. Rohit A. Patil, Amar L. Renke. 2016. Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm International Journal of Computer Applications (0975 – 8887), Volume 144 – No.9, June 2016
  4. Mahnoush B, Majid B, Mohd A. 2014. Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment Int. J. Advance Soft Compu. Appl, Vol. 6, No. 3, November 2014
  5. Rohit A., Amar L. 2016. Keystroke Dynamics for User Authentication and Identification by using Typing Rhythm, International Journal of Computer Applications (0975 – 8887) Volume 144 –No.9, June 2016
  6. Hyungu L, Jung Y, Dong I, Shincheol L, Sung-Hoon L, Ji S. 2018. Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors, Hindawi Security and Communication Networks, Volume 2018, Article ID 2567463, 10 pages https://doi.org/10.1155/2018/2567463
  7. CGIAR. 2015. Biometrics and Statistical Computing - MEL – CGIAR, ICARDA’s Strategy for Biometrics and Statistics Support to its Research: 1Draft vs1, 9 September 2015
  8. Georgios K, Dimitrios D, Dimitrios P, Emmanouil P. 2014. Introducing touchstroke: keystroke-based authentication system for smartphones. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks2016; 9:542–554Published online 1 July 2014 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1061
  9. Pavithra M., Sri Sathya K.B. 2015. Continuous User Authentication Using Keystroke Dynamics -.M.Pavithra et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, 1922-1925
Index Terms

Computer Science
Information Sciences

Keywords

Keystroke dynamics Authentication Security Privacy Password Biometric R RStudio