Suscripción a Biblioteca: Guest
Telecommunications and Radio Engineering

Publicado 12 números por año

ISSN Imprimir: 0040-2508

ISSN En Línea: 1943-6009

SJR: 0.185 SNIP: 0.268 CiteScore™:: 1.5 H-Index: 22

Indexed in

AUTHENTICATION OF USERS OF MOBILE DEVICES BY THEIR MOTOR REACTIONS

Volumen 78, Edición 11, 2019, pp. 987-1003
DOI: 10.1615/TelecomRadEng.v78.i11.60
Get accessGet access

SINOPSIS

This paper analyzes the current state of the problem on user authentication, in particular, users of mobile devices. A method for authenticating users of mobile devices has been suggested and discussed in details. The description of the developed software that implements the suggested method is given. The experiment has been planned and conducted with the developed authentication method to determine the indicators FAR and FRR. The analysis of the effectiveness of the developed user authentication method has been carried out and it has been compared with existing analogues.

REFERENCIAS
  1. Wikipedia. Information explosion URL [Electronic resource]. URL: https://ru.wikipedia.org/wiki/Informational_explosion (access date: 12/17/2018).

  2. Central Intelligence Agency The World Factbook URL URL: https://www.cia.gov/library/publications/resources/the-world-factbook/rankorder/2151rank.html.

  3. Ivanov, A.I., (2000) Biometric Authentication Based on the Dynamics of Subconscious Movements, Penza, Russia: PGU Publishing House, 178 p., (in Russian).

  4. Ivanov, A.I., (2004) Neural Network Biometric Authentication Algorithms, Book 15, series ''Neurocomputers and their Applications'', Moscow, Russia: Radio Engineering, 144 p., (in Russian).

  5. Ivanov, A.I. and Malygina, E.A. (2015) Biometric authentication of identity: inversion of matrices of neural network functional in Hamming metric space, Information security issues, 1, pp. 23-29, (in Russian).

  6. Ivanov, A.I., (2016) Multidimensional Neural Network Processing of Biometric Data with Software Reproduction of Quantum Superposition Effects, Penza, Russia: Publishing house Penzensky Scientific Research Electrotechnical Institute, 133 p., (in Russian).

  7. Bryukhomitsky, Yu.A., Zverev, EM, and Kazarin, M.N., (2005) User authentication using keyboard handwriting based on interchangeable virtual keyboards, Journal Information Countering the threat of Terrorism, 4, pp. 141-146, (in Russian).

  8. Zayats, VM. and Ulytsky, O.O., (2000) Algorithms and software for human recognition system based on manual reactions, Visnyk Derzh. Universytetu Lvivs'ka Politekhnika. Computer Engineering and Information Technologies, 392, pp.73-76, (in Ukrainian).

  9. Zayats, V.M., (2006) Approach to describing the computer user authentication system, Computer Printing Technologies, pp. 46-53, (in Ukrainian).

  10. Zayats, VM, and Zayats, M.M., (2005) Mathematical description of computer user authentication system, Physical-Mathematical Modeling and Information Technologies, Lviv, 1, pp. 146-152, (in Ukrainian).

  11. Chalaya, L.E., (2004) User Authentication Model by Keyboard Handwriting, Artificial Intelligence, 4, pp. 811-817, (in Ukrainian).

  12. Chalaya, L.E., (2007) A method of forming a database of biometric standards for authenticating users of information systems by behavioral characteristics, Bionics of intelligence, 2(67), pp. 78-83, (in Ukrainian).

  13. LTvia, C.F., Ara'ujo Luiz, H.R., Sucupira, Miguel Gustavo Liz'arraga, Lee Luan Ling, and Jo'ao Baptista T. Yabuuti, (2004) User Authentication through Typing Biometrics Features, Lecture Notes in Computer Science, 3072, pp. 694-700.

  14. De Luca, A., Hang, A., Brudy, F., Lindner, Ch., and Hussmann, H., (2012), Touch Me Once and I Know it's You! Implicit Authentication Based on Touch Screen Patterns, CHI ACM, pp. 987-996.

  15. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M., (2010) Smudge attacks on smartphone touch screens, USENIX 4th Workshop WOOT.

  16. Ball, R.M., Connel, J.H., Pankanti, S., Ratha, N.K., and Senor, E.W., (2007) Guide to Biometrics, Moscow, Russia: Tekhnosfera, 368 p., (in Russian).

  17. Rabiner, L., and Juang, B.H., (1993) Fundamentals of Speech Recognition, Prentice Hall PTR, 507 p.

  18. Eamonn, J. and Keogh, M.J., (2018) Pazzani. Derivative Dynamic Time Warping, International Journal of Research in Electronicals and Computer Engineering, 5, pp. 524-528.

  19. Senin, P., (2008) DTW Algorithm Review. Information and Computer Science Department, Honolulu, 23.

  20. Stan, S. and ChanFast, P., (2017) DTW: Toward Accurate Dynamic Time Warping in Linear Time and Space, International Journal of Science Technology Management and Research, 7, pp. 1-5.

  21. Ghazi Al-Naymat, and Sanjay Chawla, Javid Taheri, (2009) Sparse DTW: A novel approach to speed up, The 2009 Australasian Data Mining, 10, pp. 117-127.

  22. Niels, R., (2004) Dynamic Time Warping: An intuitive way of handwriting recognition? MASTER THESIS, 95 p.

  23. Lin, D.-T., (1997) Computer-access authentication with neural network based keystroke identity verification, International Conference Neural Networks, 1, pp. 174-178.

  24. Obaidat, M. and Sadoun, B., (1997) Verification of computer users using keystroke dynamics, In Systems, Man, and Cybernetics, Part B: Cybernetics, 27(2), pp. 261-269.

  25. Monrose, F. and Rubin, A.D., (1997) Authentication via keystroke dynamics, Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA: ACM, 13, pp. 48-56.

  26. Obaidat, M. and Macchiarolo, D., (1993) An online neural network system for computer access security, Industrial Electronics, IEEE Transactions, 40(2), pp. 235-242.

  27. Zahid, S., Shahzad, M., Khayam, S.A., and Farooq, M., (2009) Keystrokebased user identification on smart phones, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Berlin, 9, pp. 224-243.

  28. Shanmugapriya, D. and Padmavathi, G., (2009) The Third International Conference on Mobile Services, Resources, and Users dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, 5(1), pp. 189-196.

  29. Buchoux, A. and Clarke, N.L., (2008) Deployment of keystroke analysis on a smartphone, Proceedings of the 6th Australian Information Security & Management Conference. 6, pp. 40-47.

  30. Banerjee, S. and Woodard, D., (2012) Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7, pp. 116-139.

  31. Umphress., D. and Williams, G., (1985) Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, 23, pp. 263-273.

  32. Joyce, R. and Gupta, G., (1990) Identity authentication based on keystroke latencies, Commun. ACM. New York, NY, USA, 33, pp. 168-176.

  33. Ord, T. and Furnell, S., (2000) User authentication for keypad-based devices using keystroke analysis, Proc. 2nd Int'l Network Conf (INC 2000), 2, pp. 263-272.

  34. Clarke, N.L. and Furnell, S.M., (2006) Authenticating mobile phone users using keystroke analysis, Int. J. Inf. Secur., Berlin, Heidelberg: Springer-Verlag, 6, pp. 1-14.

  35. Saevanee, H. and Bhattarakosol, P., (2009) Authenticating user using keystroke dynamics and finger pressure, Consumer Communications and Networking Conference 6th IEEE, 6, pp. 1-2.

  36. Trojahn, M. and Ortmeier, F., (2012) Biometric authentication through a virtual keyboard for smartphones, International Journal of Computer Science & Information Technology (IJCSIT), 8.

  37. pp. 1-12.

CITADO POR
  1. Grebennik Igor, Ovezgeldyyev Ata, Hubarenko Yevhen, Hubarenko Maryna, Information Technology Reengineering of the Electricity Generation System in Post-disaster Recovery, in Information Technology in Disaster Risk Reduction, 575, 2020. Crossref

  2. Grebennik Igor, Semenets Valerii, Hubarenko Yevhen, Information Technologies for Assessing the Impact of Climate Change and Natural Disasters in Socio-Economic Systems, in Information Technology in Disaster Risk Reduction, 575, 2020. Crossref

  3. Nechyporenko Alina, Alekseeva Victoriia, Nazaryan Rozana, Gargin Vitaliy, Biometric Recognition of Personality based on Spiral Computed Tomography Data, 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), 2021. Crossref

  4. Grebennik Igor, Semenets Valerii, Hubarenko Yevhen, Hubarenko Maryna, Spasybin Maksym, Creating a List of Works on Reconstruction of Infrastructure Elements in Natural Disasters Based on Information Technologies, in Information Technology in Disaster Risk Reduction, 622, 2021. Crossref

  5. Grebennik Igor, Hubarenko Yevhen, Hubarenko Maryna, Shekhovtsov Sergiy, Disasters impact assessment based on socioeconomic approach, in Advances of Artificial Intelligence in a Green Energy Environment, 2022. Crossref

Próximos Artículos

A Slotted Pentagon Shape Quad Band Two-Element Millimeter Wave MIMO Antenna using Theory of Characteristic Modes Parveez Shariff B G, Sameena Pathan, Pallavi R Mane, Tanweer Ali Design and Develop Low power memory controller for GC-eDRAM cell using ICG Shravan Chintam, Kaleem Fatima, Paidimarry Chandra sekhar Lighting up Data: The Future of Wireless Data Transfer with Li-Fi Technology Balaka Biswas, Aryan Nakhale , Aditya Roshan Sinha Design of Implantable Antennas for Biomedical Applications M Satish Kumar, Sivasubramanyam Medasani , Penchala Reddy Sura, Tathababu Addepalli, Jetti Chandra Sekhar Rao, J Prasanth Kumar, B.Y.V.N.R. Swamy, A L Siridhara Diffraction Problem with Time-Varying Boundary Conditions Fatih Erden A Proposed MIMO Antenna Design for Ultra-Wideband THz Applications Amin Al Ka'bi, Ali Mustafa Interconnection scheme for multi-protocols heterogeneous wireless communication system in civil airport Wei Zhang, He Li, Yuchu Ji, Yang Wang Design and implementation of MIMO antenna for S-band satellite applications Suganya E, Anita Jones Mary Pushpa T, Prabhu T PROPAGATION OF VECTOR VORTEX BEAMS EXCITED BY A TERAHERTZ LASER DIELECTRIC RESONATOR Anrey Degtyarev, Mykola Dubinin, Vyacheslav Maslov, Konstantin Muntean, Oleg Svistunov DEVELOPMENT OF NOVEL CONFORMAL ARRAY ANTENNA FOR AIRBORNE APPLICATIONS Ch V Ravi Sankar, PVY Jayasree, Devana V.N Koteswara Rao , Mohammad Taj, Kolasani Rajkamal, Vegiraju Satya Sudha Hexagonal-Shaped Antenna with DGS for Band-notch Ultra-Wideband and V2X Applications Rahul Kumar Garg, Sarthak Singhal Research and design of multi-attitude DF-GNNRL simulation technology based on satellite downlink beam calculation Liping Qiao, Li Zhang, Lei Feng A Design of Microstrip Low-pass Filter using ground-plane coplanar waveguide (GCPW) Farah Mehdi Chemseddine, Elbouslemti Rahmouna, Vincent Didier Earthen Lamp Shaped DGS Dual Band Microstrip Patch Antenna for High Return Loss in Biomedical Application Sonam Gour, Amit Rathi Compact Inset-Fed Rectangular Patch antenna for C band Applications Albert William raj, K.S.Joseph Wilson Planar Antenna with Pattern Reconfigurability for IoT Applications Srinag A, S. Aruna, K.Srinivasa Naik Advanced Ultrawideband Patch Antenna for Wearable and WBAN Applications Raaunak Chaudhury, Bimal Raj Dutta A COMPACT 2X2 UWB MIMO ANTENNA WITH FUNNEL SHAPED STUB FOR ISOLATION ENHANCEMENT KARTHI J, Palanivelan Manickavelu, Mohanraj Sivagurunathan, Asokan Velu FLEXIBLE WIDE BAND TRAPEZOIDAL ANTENNA FOR ELECTROMAGENTIC HEAD IMAGING SYSTEM Vaithianathan V, Ramprabhu Sivasamy, RAMESH S, Chitra S Impact of supply voltage on SRAM cell power dissipation under different topologies Damodhar Rao M, Y.V. NARAYANA, V.V.K.D.V. PRASAD Defected Ground Square Patch Edge Truncated Polarization Reconfigurable Antenna Pritam Nikam, Jayendra Kumar, Akshay Bhosale, Achinta Baidya, Shahadev Hake An Asymmetrical Psi Shaped Multi-Band Antenna for Wireless Applications Penchala Reddy Sura, Padmaja Nimmagadda, Ch Jyotsna Rani, Tathababu Addepalli, Jagadeesh Babu Kamili, B.Y.V.N.R. Swamy Swamy, A Laxmana Siridhara, G JAGADEESWAR REDDY SMALL SCALE MIMO ANTENNA WITH HIGH ISOLATION FOR 5G COMMUNICATION DILIP KUMAR CHOUDHARY, Tanweer Ali, Rajendra Prasad P, Roshan Zameer Ahmed PERFORMANCE ANALYSIS OF ACHIEVABLE BIT RATES IN RIS-ASSISTED MASSIVE MIMO NETWORKS AT 28 GHZ BAND SHARINI DL, KANTHI M, RAVILLA DILLI EFFECT OF THICK VEGETATION COVER, BUILDING OBSTRUCTIONS, AND EARTH TERRAIN ON THE QUALITY AND PERFORMANCE OF THE GSM SIGNAL AT THE FEDERAL POLYTECHNIC ADO EKITI. Temitope John Alake, Ayodeji Bamisaye, Tolulope Tunji Oladimeji FOUR ELEMENT CIRCULAR PATCH MIMO ANTENNA WITH PROTRUDING GROUND STUB FOR 5G COMMUNICATION Rajalakshmi B, Chitra S DUAL-BAND BANDSTOP FILTERS BASED ON ULTRA THIN FREQUENCY SELECTIVE SURFACES Andrei Perov REAL-TIME IMPLEMENTATION OF LWT BASED NOVEL IR AND VI FUSION ALGORITHM USING RASPBERRY PI PLATFORM Lingamallu Naga Srinivasu, Sumanth Kumar Panguluri, Srinivasa Rao Kandula, Ponduri Vasanthi Fractal Based UWB-MIMO antenna with reconfigurable Band-Notching Characteristics Bharghava Punna, Mohd Sofiyan, N. Siddartha Reddy, Nagarani Bollam
Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones Precios y Políticas de Suscripcione Begell House Contáctenos Language English 中文 Русский Português German French Spain