Выходит 12 номеров в год
ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009
Indexed in
AUTHENTICATION OF USERS OF MOBILE DEVICES BY THEIR MOTOR REACTIONS
Краткое описание
This paper analyzes the current state of the problem on user authentication, in particular, users of mobile devices. A method for authenticating users of mobile devices has been suggested and discussed in details. The description of the developed software that implements the suggested method is given. The experiment has been planned and conducted with the developed authentication method to determine the indicators FAR and FRR. The analysis of the effectiveness of the developed user authentication method has been carried out and it has been compared with existing analogues.
-
Wikipedia. Information explosion URL [Electronic resource]. URL: https://ru.wikipedia.org/wiki/Informational_explosion (access date: 12/17/2018).
-
Central Intelligence Agency The World Factbook URL URL: https://www.cia.gov/library/publications/resources/the-world-factbook/rankorder/2151rank.html.
-
Ivanov, A.I., (2000) Biometric Authentication Based on the Dynamics of Subconscious Movements, Penza, Russia: PGU Publishing House, 178 p., (in Russian).
-
Ivanov, A.I., (2004) Neural Network Biometric Authentication Algorithms, Book 15, series ''Neurocomputers and their Applications'', Moscow, Russia: Radio Engineering, 144 p., (in Russian).
-
Ivanov, A.I. and Malygina, E.A. (2015) Biometric authentication of identity: inversion of matrices of neural network functional in Hamming metric space, Information security issues, 1, pp. 23-29, (in Russian).
-
Ivanov, A.I., (2016) Multidimensional Neural Network Processing of Biometric Data with Software Reproduction of Quantum Superposition Effects, Penza, Russia: Publishing house Penzensky Scientific Research Electrotechnical Institute, 133 p., (in Russian).
-
Bryukhomitsky, Yu.A., Zverev, EM, and Kazarin, M.N., (2005) User authentication using keyboard handwriting based on interchangeable virtual keyboards, Journal Information Countering the threat of Terrorism, 4, pp. 141-146, (in Russian).
-
Zayats, VM. and Ulytsky, O.O., (2000) Algorithms and software for human recognition system based on manual reactions, Visnyk Derzh. Universytetu Lvivs'ka Politekhnika. Computer Engineering and Information Technologies, 392, pp.73-76, (in Ukrainian).
-
Zayats, V.M., (2006) Approach to describing the computer user authentication system, Computer Printing Technologies, pp. 46-53, (in Ukrainian).
-
Zayats, VM, and Zayats, M.M., (2005) Mathematical description of computer user authentication system, Physical-Mathematical Modeling and Information Technologies, Lviv, 1, pp. 146-152, (in Ukrainian).
-
Chalaya, L.E., (2004) User Authentication Model by Keyboard Handwriting, Artificial Intelligence, 4, pp. 811-817, (in Ukrainian).
-
Chalaya, L.E., (2007) A method of forming a database of biometric standards for authenticating users of information systems by behavioral characteristics, Bionics of intelligence, 2(67), pp. 78-83, (in Ukrainian).
-
LTvia, C.F., Ara'ujo Luiz, H.R., Sucupira, Miguel Gustavo Liz'arraga, Lee Luan Ling, and Jo'ao Baptista T. Yabuuti, (2004) User Authentication through Typing Biometrics Features, Lecture Notes in Computer Science, 3072, pp. 694-700.
-
De Luca, A., Hang, A., Brudy, F., Lindner, Ch., and Hussmann, H., (2012), Touch Me Once and I Know it's You! Implicit Authentication Based on Touch Screen Patterns, CHI ACM, pp. 987-996.
-
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M., (2010) Smudge attacks on smartphone touch screens, USENIX 4th Workshop WOOT.
-
Ball, R.M., Connel, J.H., Pankanti, S., Ratha, N.K., and Senor, E.W., (2007) Guide to Biometrics, Moscow, Russia: Tekhnosfera, 368 p., (in Russian).
-
Rabiner, L., and Juang, B.H., (1993) Fundamentals of Speech Recognition, Prentice Hall PTR, 507 p.
-
Eamonn, J. and Keogh, M.J., (2018) Pazzani. Derivative Dynamic Time Warping, International Journal of Research in Electronicals and Computer Engineering, 5, pp. 524-528.
-
Senin, P., (2008) DTW Algorithm Review. Information and Computer Science Department, Honolulu, 23.
-
Stan, S. and ChanFast, P., (2017) DTW: Toward Accurate Dynamic Time Warping in Linear Time and Space, International Journal of Science Technology Management and Research, 7, pp. 1-5.
-
Ghazi Al-Naymat, and Sanjay Chawla, Javid Taheri, (2009) Sparse DTW: A novel approach to speed up, The 2009 Australasian Data Mining, 10, pp. 117-127.
-
Niels, R., (2004) Dynamic Time Warping: An intuitive way of handwriting recognition? MASTER THESIS, 95 p.
-
Lin, D.-T., (1997) Computer-access authentication with neural network based keystroke identity verification, International Conference Neural Networks, 1, pp. 174-178.
-
Obaidat, M. and Sadoun, B., (1997) Verification of computer users using keystroke dynamics, In Systems, Man, and Cybernetics, Part B: Cybernetics, 27(2), pp. 261-269.
-
Monrose, F. and Rubin, A.D., (1997) Authentication via keystroke dynamics, Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA: ACM, 13, pp. 48-56.
-
Obaidat, M. and Macchiarolo, D., (1993) An online neural network system for computer access security, Industrial Electronics, IEEE Transactions, 40(2), pp. 235-242.
-
Zahid, S., Shahzad, M., Khayam, S.A., and Farooq, M., (2009) Keystrokebased user identification on smart phones, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Berlin, 9, pp. 224-243.
-
Shanmugapriya, D. and Padmavathi, G., (2009) The Third International Conference on Mobile Services, Resources, and Users dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, 5(1), pp. 189-196.
-
Buchoux, A. and Clarke, N.L., (2008) Deployment of keystroke analysis on a smartphone, Proceedings of the 6th Australian Information Security & Management Conference. 6, pp. 40-47.
-
Banerjee, S. and Woodard, D., (2012) Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7, pp. 116-139.
-
Umphress., D. and Williams, G., (1985) Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, 23, pp. 263-273.
-
Joyce, R. and Gupta, G., (1990) Identity authentication based on keystroke latencies, Commun. ACM. New York, NY, USA, 33, pp. 168-176.
-
Ord, T. and Furnell, S., (2000) User authentication for keypad-based devices using keystroke analysis, Proc. 2nd Int'l Network Conf (INC 2000), 2, pp. 263-272.
-
Clarke, N.L. and Furnell, S.M., (2006) Authenticating mobile phone users using keystroke analysis, Int. J. Inf. Secur., Berlin, Heidelberg: Springer-Verlag, 6, pp. 1-14.
-
Saevanee, H. and Bhattarakosol, P., (2009) Authenticating user using keystroke dynamics and finger pressure, Consumer Communications and Networking Conference 6th IEEE, 6, pp. 1-2.
-
Trojahn, M. and Ortmeier, F., (2012) Biometric authentication through a virtual keyboard for smartphones, International Journal of Computer Science & Information Technology (IJCSIT), 8.
-
pp. 1-12.
-
Grebennik Igor, Ovezgeldyyev Ata, Hubarenko Yevhen, Hubarenko Maryna, Information Technology Reengineering of the Electricity Generation System in Post-disaster Recovery, in Information Technology in Disaster Risk Reduction, 575, 2020. Crossref
-
Grebennik Igor, Semenets Valerii, Hubarenko Yevhen, Information Technologies for Assessing the Impact of Climate Change and Natural Disasters in Socio-Economic Systems, in Information Technology in Disaster Risk Reduction, 575, 2020. Crossref
-
Nechyporenko Alina, Alekseeva Victoriia, Nazaryan Rozana, Gargin Vitaliy, Biometric Recognition of Personality based on Spiral Computed Tomography Data, 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), 2021. Crossref
-
Grebennik Igor, Semenets Valerii, Hubarenko Yevhen, Hubarenko Maryna, Spasybin Maksym, Creating a List of Works on Reconstruction of Infrastructure Elements in Natural Disasters Based on Information Technologies, in Information Technology in Disaster Risk Reduction, 622, 2021. Crossref
-
Grebennik Igor, Hubarenko Yevhen, Hubarenko Maryna, Shekhovtsov Sergiy, Disasters impact assessment based on socioeconomic approach, in Advances of Artificial Intelligence in a Green Energy Environment, 2022. Crossref