Library Subscription: Guest
Begell Digital Portal Begell Digital Library eBooks Journals References & Proceedings Research Collections
Telecommunications and Radio Engineering
SJR: 0.202 SNIP: 0.2 CiteScore™: 0.23

ISSN Print: 0040-2508
ISSN Online: 1943-6009

Volumes:
Volume 78, 2019 Volume 77, 2018 Volume 76, 2017 Volume 75, 2016 Volume 74, 2015 Volume 73, 2014 Volume 72, 2013 Volume 71, 2012 Volume 70, 2011 Volume 69, 2010 Volume 68, 2009 Volume 67, 2008 Volume 66, 2007 Volume 65, 2006 Volume 64, 2005 Volume 63, 2005 Volume 62, 2004 Volume 61, 2004 Volume 60, 2003 Volume 59, 2003 Volume 58, 2002 Volume 57, 2002 Volume 56, 2001 Volume 55, 2001 Volume 54, 2000 Volume 53, 1999 Volume 52, 1998 Volume 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.60
pages 987-1003

AUTHENTICATION OF USERS OF MOBILE DEVICES BY THEIR MOTOR REACTIONS

A. S. Nechiporenko
Kharkiv National University of Radio Engineering and Electronics, 14, Nauka Ave, Kharkiv, 61166, Ukraine
E.V. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
M.S. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine

ABSTRACT

This paper analyzes the current state of the problem on user authentication, in particular, users of mobile devices. A method for authenticating users of mobile devices has been suggested and discussed in details. The description of the developed software that implements the suggested method is given. The experiment has been planned and conducted with the developed authentication method to determine the indicators FAR and FRR. The analysis of the effectiveness of the developed user authentication method has been carried out and it has been compared with existing analogues.

REFERENCES

  1. Wikipedia. Information explosion URL [Electronic resource]. URL: https://ru.wikipedia.org/wiki/Informational_explosion (access date: 12/17/2018).

  2. Central Intelligence Agency The World Factbook URL URL: https://www.cia.gov/library/publications/resources/the-world-factbook/rankorder/2151rank.html.

  3. Ivanov, A.I., (2000) Biometric Authentication Based on the Dynamics of Subconscious Movements, Penza, Russia: PGU Publishing House, 178 p., (in Russian).

  4. Ivanov, A.I., (2004) Neural Network Biometric Authentication Algorithms, Book 15, series ''Neurocomputers and their Applications'', Moscow, Russia: Radio Engineering, 144 p., (in Russian).

  5. Ivanov, A.I. and Malygina, E.A. (2015) Biometric authentication of identity: inversion of matrices of neural network functional in Hamming metric space, Information security issues, 1, pp. 23-29, (in Russian).

  6. Ivanov, A.I., (2016) Multidimensional Neural Network Processing of Biometric Data with Software Reproduction of Quantum Superposition Effects, Penza, Russia: Publishing house Penzensky Scientific Research Electrotechnical Institute, 133 p., (in Russian).

  7. Bryukhomitsky, Yu.A., Zverev, EM, and Kazarin, M.N., (2005) User authentication using keyboard handwriting based on interchangeable virtual keyboards, Journal Information Countering the threat of Terrorism, 4, pp. 141-146, (in Russian).

  8. Zayats, VM. and Ulytsky, O.O., (2000) Algorithms and software for human recognition system based on manual reactions, Visnyk Derzh. Universytetu Lvivs'ka Politekhnika. Computer Engineering and Information Technologies, 392, pp.73-76, (in Ukrainian).

  9. Zayats, V.M., (2006) Approach to describing the computer user authentication system, Computer Printing Technologies, pp. 46-53, (in Ukrainian).

  10. Zayats, VM, and Zayats, M.M., (2005) Mathematical description of computer user authentication system, Physical-Mathematical Modeling and Information Technologies, Lviv, 1, pp. 146-152, (in Ukrainian).

  11. Chalaya, L.E., (2004) User Authentication Model by Keyboard Handwriting, Artificial Intelligence, 4, pp. 811-817, (in Ukrainian).

  12. Chalaya, L.E., (2007) A method of forming a database of biometric standards for authenticating users of information systems by behavioral characteristics, Bionics of intelligence, 2(67), pp. 78-83, (in Ukrainian).

  13. LTvia, C.F., Ara'ujo Luiz, H.R., Sucupira, Miguel Gustavo Liz'arraga, Lee Luan Ling, and Jo'ao Baptista T. Yabuuti, (2004) User Authentication through Typing Biometrics Features, Lecture Notes in Computer Science, 3072, pp. 694-700.

  14. De Luca, A., Hang, A., Brudy, F., Lindner, Ch., and Hussmann, H., (2012), Touch Me Once and I Know it's You! Implicit Authentication Based on Touch Screen Patterns, CHI ACM, pp. 987-996.

  15. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M., (2010) Smudge attacks on smartphone touch screens, USENIX 4th Workshop WOOT.

  16. Ball, R.M., Connel, J.H., Pankanti, S., Ratha, N.K., and Senor, E.W., (2007) Guide to Biometrics, Moscow, Russia: Tekhnosfera, 368 p., (in Russian).

  17. Rabiner, L., and Juang, B.H., (1993) Fundamentals of Speech Recognition, Prentice Hall PTR, 507 p.

  18. Eamonn, J. and Keogh, M.J., (2018) Pazzani. Derivative Dynamic Time Warping, International Journal of Research in Electronicals and Computer Engineering, 5, pp. 524-528.

  19. Senin, P., (2008) DTW Algorithm Review. Information and Computer Science Department, Honolulu, 23.

  20. Stan, S. and ChanFast, P., (2017) DTW: Toward Accurate Dynamic Time Warping in Linear Time and Space, International Journal of Science Technology Management and Research, 7, pp. 1-5.

  21. Ghazi Al-Naymat, and Sanjay Chawla, Javid Taheri, (2009) Sparse DTW: A novel approach to speed up, The 2009 Australasian Data Mining, 10, pp. 117-127.

  22. Niels, R., (2004) Dynamic Time Warping: An intuitive way of handwriting recognition? MASTER THESIS, 95 p.

  23. Lin, D.-T., (1997) Computer-access authentication with neural network based keystroke identity verification, International Conference Neural Networks, 1, pp. 174-178.

  24. Obaidat, M. and Sadoun, B., (1997) Verification of computer users using keystroke dynamics, In Systems, Man, and Cybernetics, Part B: Cybernetics, 27(2), pp. 261-269.

  25. Monrose, F. and Rubin, A.D., (1997) Authentication via keystroke dynamics, Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA: ACM, 13, pp. 48-56.

  26. Obaidat, M. and Macchiarolo, D., (1993) An online neural network system for computer access security, Industrial Electronics, IEEE Transactions, 40(2), pp. 235-242.

  27. Zahid, S., Shahzad, M., Khayam, S.A., and Farooq, M., (2009) Keystrokebased user identification on smart phones, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Berlin, 9, pp. 224-243.

  28. Shanmugapriya, D. and Padmavathi, G., (2009) The Third International Conference on Mobile Services, Resources, and Users dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, 5(1), pp. 189-196.

  29. Buchoux, A. and Clarke, N.L., (2008) Deployment of keystroke analysis on a smartphone, Proceedings of the 6th Australian Information Security & Management Conference. 6, pp. 40-47.

  30. Banerjee, S. and Woodard, D., (2012) Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7, pp. 116-139.

  31. Umphress., D. and Williams, G., (1985) Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, 23, pp. 263-273.

  32. Joyce, R. and Gupta, G., (1990) Identity authentication based on keystroke latencies, Commun. ACM. New York, NY, USA, 33, pp. 168-176.

  33. Ord, T. and Furnell, S., (2000) User authentication for keypad-based devices using keystroke analysis, Proc. 2nd Int'l Network Conf (INC 2000), 2, pp. 263-272.

  34. Clarke, N.L. and Furnell, S.M., (2006) Authenticating mobile phone users using keystroke analysis, Int. J. Inf. Secur., Berlin, Heidelberg: Springer-Verlag, 6, pp. 1-14.

  35. Saevanee, H. and Bhattarakosol, P., (2009) Authenticating user using keystroke dynamics and finger pressure, Consumer Communications and Networking Conference 6th IEEE, 6, pp. 1-2.

  36. Trojahn, M. and Ortmeier, F., (2012) Biometric authentication through a virtual keyboard for smartphones, International Journal of Computer Science & Information Technology (IJCSIT), 8.

  37. pp. 1-12.


Articles with similar content:

THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS
Telecommunications and Radio Engineering, Vol.74, 2015, issue 1
A.A. Smirnov, A. A. Kuznetsov, D.A. Danilenko, A. Berezovsky
Application of Complex-Valued Signals in Asynchronous Data Transmission Systems
Telecommunications and Radio Engineering, Vol.69, 2010, issue 3
E. A. Grigorievykh, R. G. Khafizov
Analysis of Efficiency of the Noise-Immunity Encoding in Channels with Discrete Frequency-Aggregate Signals
Telecommunications and Radio Engineering, Vol.63, 2005, issue 2-6
V. A. Pimenov
CFD ANALYSIS ON FLOW CHARACTERISTICS OF PERFORATED PLATE IN MULTI-STAGE HIGH PRESSURE REDUCING VALVE
3rd Thermal and Fluids Engineering Conference (TFEC), Vol.5, 2018, issue
Fu-qiang Chen, Jin-yuan Qian, Zhi-jiang Jin
Particularities in Application of Stochastic Metagrammars for Modeling the States of Digital Channels of Communication During Retrieval of Documentary Messages
Telecommunications and Radio Engineering, Vol.62, 2004, issue 1-6
O. I. Atakishchev, B. V. Klujkov