Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Strengthen user authentication on mobile devices by using user’s touch dynamics pattern

Teh, PS, Zhang, N, Tan, SY, Shi, Q, Khoh, WH and Nawaz, R (2019) Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing. ISSN 1868-5137

[img]
Preview
Text
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern.pdf - Published Version
Available under License Creative Commons Attribution.

Download (3MB) | Preview
Open Access URL: https://doi.org/10.1007/s12652-019-01654-y (Published version)

Abstract

Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have investigated the use of touch dynamics biometrics as a mobile device authentication solution by designing, implementing and evaluating a touch dynamics authentication method. This paper describes the design, implementation, and evaluation of this method, the acquisition of raw touch dynamics data, the use of the raw data to obtain touch dynamics features, and the training of the features to build an authentication model for user identity verification. The evaluation results show that by integrating the touch dynamics authentication method into the PIN-based authentication method, the protection levels against impersonation attacks is greatly enhanced. For example, if a PIN is compromised, the success rate of an impersonation attempt is drastically reduced from 100% (if only a 4-digit PIN is used) to 9.9% (if both the PIN and the touch dynamics are used). © 2019, The Author(s).

Item Type: Article
Uncontrolled Keywords: 0805 Distributed Computing, 0801 Artificial Intelligence and Image Processing
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Computer Science
Publisher: Springer (part of Springer Nature)
Date Deposited: 23 Mar 2020 10:46
Last Modified: 23 Mar 2020 10:46
DOI or Identification number: 10.1007/s12652-019-01654-y
URI: http://researchonline.ljmu.ac.uk/id/eprint/12576

Actions (login required)

View Item View Item