Purpose -In keystroke-based authentication systems, an input device to enter a password is needed. Users are verified by checking the validity of the password and typing characteristics. However, some devices have no standard desktop keyboard such as personal digital assistants and mobile phones. With these types of electronics, the system cannot successfully work in the authentication phase while the registration process is implemented based on a computer keyboard. This results in a reduction of system portability. The purpose of this paper is to employ the rhythm clicked by a mouse as another identifiable factor to authenticate a user's identity. Design/methodology/approach -Mouse click can be replaced by a stylus and fingers on touch screens or numeral buttons on mobile phones. A total of 25 users participated and the click data are based on time instances of pressing and releasing the mouse button, which are captured while the user clicks a rhythm. Three features are calculated using these click data, and a reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor. Findings -A reasonable amount of results with neural networks and other classifiers shows the click characteristics are able to function as another identifiable factor. Originality/value -The paper presents a personalized rhythm click-based authentication system.
Most of subscribers use personal identification number (PIN) codes which combined with 6-8 numbers to protect their Subscriber Identity Module (SIM) cards from illegal accesses. To enhance security, many previous studies have employed keystroke dynamics to protect the PIN code, and the relative results exhibit that keystroke dynamics can indeed improve the security of a PIN code. However, the traditional keystroke dynamics-based authentication (KDA) system has to collect user's keystroke dynamics firstly and then produce a unique personal biometrics. It's inconvenient for users when changing their PIN codes is required, because the corresponding KDA systems have to be retrained. To solve the above-mentioned drawbacks, this paper proposes a novel technique by which users can change their PIN codes anytime, without any extra retraining. Conducted experiment results show that the proposed approach can effectively improve the KDA system to distinguish legitimate users and impostors even when users change their original passwords.
One can apply cell phones to access e-bank, buy stocks, pay credit card bills, and so on. The security issues of cell phones become extremely important. Most of subscribers use personal identification number (PIN) codes which combined with 6-8 numbers to protect their subscriber identity module cards from illegal accesses. It is easily to be decoded by the dictionary attack or shoulder surfing attack. Many studies employed keystroke dynamics to protect the PIN code, and the relative results exhibit that keystroke dynamics can indeed improve the security of a PIN code. However, the traditional keystroke dynamics-based authentication (KDA) system has to collect user's keystroke dynamics firstly and then produce a unique personal biometrics. It is inconvenient for users when changing their PIN codes is required, because the corresponding KDA systems should be retrained. To solve the previously mentioned drawbacks, this paper proposes a novel technique that allows users to change their PIN codes anytime without any extra retraining. This technique not only enhance the security of the PIN codes but also enrich the security of accessing e-bank, buying stocks, paying credit card bill, and other service via smart phones. Conducted experiment results show that the proposed system can effectively improve the KDA system to distinguish legitimate users and impostors even when users change their original passwords. Copyright
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANETs are not only used to enhance the road safety and reduce the traffic accidents earlier but also conducted more researches in network value-added service. As a result, the security requirements of vehicle communication are given more attention. In order to prevent the security threat of VANETs, the security requirements, such as the message integrity, availability, and confidentiality are needed to be guaranteed further. Therefore, a secured and efficient verification scheme for VANETs is proposed to satisfy these requirements and reduce the computational cost by combining the asymmetric and symmetric cryptology, certificate, digital signature, and session key update mechanism. In addition, our proposed scheme can resist malicious attacks or prevent illegal users' access via security and performance analysis. In summary, the proposed scheme is proved to achieve the requirements of resist known attacks, non-repudiation, authentication, availability, integrity, and confidentiality.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.