2018
DOI: 10.1155/2018/2567463
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors

Abstract: Personal Identification Numbers (PINs) and pattern drawing have been used as common authentication methods especially on smartphones. Such methods, however, are very vulnerable to the shoulder surfing attack. Thus, keystroke dynamics that authenticate legitimate users based on their typing manner have been studied for years. However, many of the studies have focused on PC keyboard keystrokes. More studies on mobile and smartphones keystroke dynamics are warranted; as smartphones make progress in both hardware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…Besides the traditional biometrics like the fingerprint and face, behavioral biometrics have also been used for user authentication of mobile devices. In [19], keystroke dynamics were combined with the PIN as multifactor authentication for the mobile user. Data from the motion sensors, such as the accelerometer, gyroscope, and rotation was included to improve the performance of authentication.…”
Section: Biometrics-based Mobile User Authenticationmentioning
confidence: 99%
“…Besides the traditional biometrics like the fingerprint and face, behavioral biometrics have also been used for user authentication of mobile devices. In [19], keystroke dynamics were combined with the PIN as multifactor authentication for the mobile user. Data from the motion sensors, such as the accelerometer, gyroscope, and rotation was included to improve the performance of authentication.…”
Section: Biometrics-based Mobile User Authenticationmentioning
confidence: 99%
“…N-graph [27] feature is also based on key timings which have been used by researchers. Key hold time (the period for which a key is pressed) also known as dwell time is another popular time-based feature used very rigorously in past studies [28], [29]. These features extracted from the keypress events are termed as keystroke or touch features.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a 2018 study, with more advanced smartphone technology, there was an attempt to classify users using the data measured by a motion sensor built into a smartphone [ 9 ]. These results were compared with the existing results obtained without using motion data.…”
Section: Related Workmentioning
confidence: 99%