Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm
Wenchuan YANG, Fang FANG
.
DOI: 10.4236/ijcns.2009.28082   PDF    HTML     6,137 Downloads   10,095 Views   Citations

Abstract

Keystroke rhythm identification, which extracts biometric characteristics through keyboards without addi-tional expensive devices, is a kind of biometric identification technology. The paper proposes a dynamic identity authentication model based on the improved keystroke rhythm algorithm in Rick Joyce model and implement this model in a mobile phone system. The experimental results show that comparing with the original model, the false alarm rate (FAR) of the improved model decreases a lot in the mobile phone system, and its growth of imposter pass rate (IPR) is slower than the Rick Joyce model’s. The improved model is more suitable for small memory systems, and it has better performance in security and dynamic adaptation. This improved model has good application value.

Share and Cite:

W. YANG and F. FANG, "Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm," International Journal of Communications, Network and System Sciences, Vol. 2 No. 8, 2009, pp. 714-719. doi: 10.4236/ijcns.2009.28082.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] M. Zhu, J. Zhou, and J. K. Wang, “A new approach for user authentication based on biometrics,” Computer Engineering, Vol. 28, No. 10, October 2002.
[2] S. Bleha, C. Slivinsky, and B.Hussien, “Computer-access security systems using keystroke dynamics[J],” IEEE Transactions on Pattern Analysis and Machine Intelli- gence, Vol. 12, No. 12, December 1990.
[3] F. Monrose and A. D. Rubin, “Keystroke dynamics as a biometric for authentication. future generation computing systems (FGCS),” Journal: Security on The Web (Special issue), March 2000.
[4] F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamic,” Proceedings of the 6 ACM Conference on Computer and Communication Security, 1999.
[5] R. Joyce and G. Gupta, “Identity authentication based on keystroke latencies,” Communications of the ACM, February 1990.
[6] F. Bergadano, D. Gunetti, and C. Picardi, University of Torino, “User authentication through keystroke dynamics [J],” ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002.
[7] W. G. de Ru and J. Eloff, “Enhanced password authen- tication through fuzzy logic[J],” IEEE Expert, Vol. 12, No. 6, November/December 1997.
[8] Z. H. Deng, S. Q. Zhuo, etc., “The development of applications in mobile phone systems,” Science Press, March 2004.
[9] R. Gaines, W. Lisowski, and S. Press, “Authentication by keystroke timing: Some preliminary results[R],” Rand Corporation:Rand Report R-2560-NSF, 1980.
[10] J. Sleggett, G. Williams, and J. Usnick, “Dynamic iden-tity verification via keystroke characteristics,” Interna-tional Journal of Man-Machine Studies, 1991.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.