Abstract
Android is one of the most popular operating systems being used in smartphones and is facing security issues. Many authentication techniques are being used, and most of them are based on username, password or PIN. These techniques are considered weak because of several drawbacks such as passwords and PIN can be guessed, forgotten or stolen. When the mobile phone is stolen, misplaced or in the possession of the third party, an unauthorized user can get access to the applications and features of the mobile phone. Furthermore, after a one-time login, no further credentials are required. Therefore, a better security authentication system is needed to overcome this problem. This study proposes an identity management framework that can secure mobile application’s data from an unauthorized user. The proposed framework consists of various features that are extracted from phone swiping behaviour. The framework is comprised of enrolment and authentication phases. In the enrolment phase, the system learns the user behaviour, and in the authentication phase, it is able to accept or reject the current user based on his behaviour.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsChange history
17 July 2019
In the original version of the book, the following belated corrections are to be incorporated.
References
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of International Conference on Dependable Systems and Networks, pp. 125–134 (2009)
Roh, J.H., Lee, S.H., Kim, S.: Keystroke dynamics for authentication in smartphone. In: 2016 International Conference on Information and Communication Technology Convergence, ICTC 2016, pp. 1155–1159 (2016)
Clarke, N., Karatzouni, S., Furnell, S.: Flexible and transparent user authentication for mobile devices. IFIP Adv. Inf. Commun. Technol. 297, 1–12 (2009)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2007)
Nauman, M., Ali, T.: TOKEN: trustable keystroke-based authentication for web-based applications on smartphones. Commun. Comput. Inf. Sci. 76, 286–297 (2010)
Zahid, S., Shahzad, M., Khayam, S.A.: Keystroke-based user identification on smart phones. In: International Workshop on Recent Advances in Intrusion Detection, pp. 224–243 (2009)
Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: Proceedings—International Conference on Network Protocols, ICNP 2014, pp. 221–232 (2014)
Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. Security V, 1–43 (2009)
Takahashi, H., Ogura, K., Bista, B.B., Takata, T.: A user authentication scheme using keystrokes for smartphones while moving. In: International Symposium on Information Theory and Its Applications, no. C, pp. 310–314 (2016)
Chang, T.Y., Tsai, C.J., Lin, J.H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)
Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of 8th USENIX Security Symposium, vol. 8, p. 1 (1999)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. 5(4), 367–397 (2002)
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it’s you! In: Proceedings of 2012 ACM Annual Conference on Human Factors in Computing Systems, CHI ’12, p. 987 (2012)
Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: SIGCHI Conference on Human Factors in Computing Systems, p. 977 (2012)
Riva, O., Qin, C., Strauss, K.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21 st USENIX Conference on Security Symposium, pp. 1–16 (2011)
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013 (2013)
Babaeizadeh, M., Bakhtiari, M., Maarof, M.A.: Keystroke dynamic authentication in mobile cloud computing. Int. J. Comput. Appl. 90(1), 975–8887 (2014)
Jeong, H., Choi, E.: User authentication using profiling in mobile cloud computing. AASRI Procedia 2, 262–267 (2012)
Putri, A.N., Asnar, Y.D.W., Akbar, S.: A continuous fusion authentication for Android based on keystroke dynamics and touch gesture. In: Proceedings of 2016 International Conference on Data and Software Engineering, ICoDSE 2016 (2017)
Abdulhakim Alariki, A., Abdul Manaf, A., Mojtaba Mousavi, S.: Features extraction scheme for behavioral biometric authentication in touchscreen mobile devices. Int. J. Appl. Eng. Res. 11(18), 973–4562 (2016)
Teh, P.S., Zhang, N., Teoh, A.B.J., Chen, K.: A survey on touch dynamics authentication in mobile devices. Comput. Secur. 59, 210–235 (2016)
Saini, B.S., Kaur, N., Bhatia, K.S.: Keystroke dynamics for mobile phones: a survey. Indian J. Sci. Technol. 9(6), 1–8 (2016)
Bhardwaj, I., Londhe, N.D., Kopparapu, S.K.: Study of imposter attacks on novel fingerprint dynamics based verification system. IEEE Access 5, 595–606
Acknowledgements
This research is funded by Universiti Tunku Abdul Rahman (UTAR) under the UTAR Research Fund (UTARRF): 6200/V02.
Informed consent was obtained from all individual participants included in the study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ali, A.B.A., Ponnusamy, V., Sangodiah, A. (2019). User Behaviour-Based Mobile Authentication System. In: Bhatia, S., Tiwari, S., Mishra, K., Trivedi, M. (eds) Advances in Computer Communication and Computational Sciences. Advances in Intelligent Systems and Computing, vol 924. Springer, Singapore. https://doi.org/10.1007/978-981-13-6861-5_40
Download citation
DOI: https://doi.org/10.1007/978-981-13-6861-5_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6860-8
Online ISBN: 978-981-13-6861-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)