Skip to main content

Password Recovery Mechanism Based on Keystroke Dynamics

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 339))

Abstract

Automated password recovery process includes needing the user to response a “secret question” defined as part of the user registration process. The second mechanism in use is having the user offer a “hints” during record-keeping that helps the user remember his password. Here, system may be compromise through the use of brute-force attacks, inherent system weakness or easily guessed secret questions and answers. The third mechanism is One Time Password (OTP), where personal phone or alternative user ID is needed. The fourth mechanism is our proposed, password recovery mechanism based on behavioral biometric characteristics, keystroke dynamics data. Here, users are not only identified by their secret questions answers or hints, but their typing style is also accounted for. It improves the security rank and can be used to identify the real user. In this paper, we have also suggested some future plans that also can be effectively implemented by this technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Forsen, G., Nelson, M., Raymond Staron, J.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center, Oct 1977

    Google Scholar 

  2. Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Rand Rep. R-2560-NSF, Rand Corporation, California (1980)

    Google Scholar 

  3. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)

    Article  Google Scholar 

  4. Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  5. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)

    Article  Google Scholar 

  6. Killourhy, K.S.: A scientific understanding of keystroke dynamics. Ph.D. Thesis, Computer Science Department, Carnegie Mellon University, Pittsburgh (2012)

    Google Scholar 

  7. Roy, S., Roy, U., Sinha, D.D.: Enhanced knowledge-based user authentication technique via keystroke dynamics. Int. J. Eng. Sci. Invention (IJESI) 3(9), 41–48 (2014)

    Google Scholar 

  8. Roy, S., Roy, U., Sinha, D.D.: Rhythmic password-based cryptosystem. In: 2nd International Conference on Computing and System, pp. 303–307. University of Burdwan, West Bengal, India (2013)

    Google Scholar 

  9. Roy, S., Roy, U., Sinha, D.D.: Modified knowledge-based user authentication technique. In: 7th International Conference on Mathematical Science for Advancement of Science and Technology, MSAST, vol. 2, p. 236. IMBIC, Kolkata, India (2013)

    Google Scholar 

  10. Roy, S., Roy, U., Sinha, D.D.: Combined user authentication technique. In: International Conference on Recent Trends in Science and Technology (ICRTST), pp. 106–113. College of Engineering and Management, Kolaghat, West Bengal, India (2013)

    Google Scholar 

  11. Pin, S.T., Andrew, B.J.T., Shigang, Y.: A survey of keystroke dynamics biometrics. Sci. World J. 2013 (2013). Article ID: 408280

    Google Scholar 

  12. Shimaa, I.H., Mazen. M.S., Hala, H.: User authentication with adaptive keystroke dynamics. IJCSI 10(4) (2013)

    Google Scholar 

  13. Janakiraman, R., Sim, T.: Keystroke dynamics in a general setting. In: Advances in Biometrics (ICB 2007). Lecture Notes in Computer Science, Seoul, Korea, vol. 4642, pp. 584–593. Springer, Berlin

    Google Scholar 

  14. Roth, J., Liu, X., Ross, A., Metaxas, D.: Biometric authentication via keystroke sound. Int. Conf. Biometrics (ICB) 1(8), 4–7 (2013)

    Google Scholar 

Download references

Acknowledgments

Authors acknowledge Mr. Champak Chakraborty, Department of Physics, Bagnan College and Mr. Sourjya Roy, Department of English, Bagnan College for reading the manuscript carefully.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumen Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Roy, S., Roy, U., Sinha, D.D. (2015). Password Recovery Mechanism Based on Keystroke Dynamics. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2250-7_24

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2249-1

  • Online ISBN: 978-81-322-2250-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics