
AbstractMobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have investigated the use of touch dynamics biometrics as a mobile device authentication solution by designing, implementing and evaluating a touch dynamics authentication method. This paper describes the design, implementation, and evaluation of this method, the acquisition of raw touch dynamics data, the use of the raw data to obtain touch dynamics features, and the training of the features to build an authentication model for user identity verification. The evaluation results show that by integrating the touch dynamics authentication method into the PIN-based authentication method, the protection levels against impersonation attacks is greatly enhanced. For example, if a PIN is compromised, the success rate of an impersonation attempt is drastically reduced from 100% (if only a 4-digit PIN is used) to 9.9% (if both the PIN and the touch dynamics are used).
QA75, FOS: Computer and information sciences, User Authentication Methods and Security Measures, Fingerprint (computing), Usability, Mobile device, 0805 Distributed Computing, Fingerprint recognition, QA76, user authentication, Characterization and Detection of Android Malware, Computer security, Lightweight Extensible Authentication Protocol, Mobile computing, Authentication, USable, Human–computer interaction, Chip Authentication Program, behavioural biometrics, Continuous Authentication, Biometric Recognition and Security Systems, 600, Computer science, Challenge-Handshake Authentication Protocol, Multimodal Biometrics, World Wide Web, touch dynamics, Biometrics, QA75-76.95 Calculating machines, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Authentication protocol, Multi-factor authentication, Information Systems
QA75, FOS: Computer and information sciences, User Authentication Methods and Security Measures, Fingerprint (computing), Usability, Mobile device, 0805 Distributed Computing, Fingerprint recognition, QA76, user authentication, Characterization and Detection of Android Malware, Computer security, Lightweight Extensible Authentication Protocol, Mobile computing, Authentication, USable, Human–computer interaction, Chip Authentication Program, behavioural biometrics, Continuous Authentication, Biometric Recognition and Security Systems, 600, Computer science, Challenge-Handshake Authentication Protocol, Multimodal Biometrics, World Wide Web, touch dynamics, Biometrics, QA75-76.95 Calculating machines, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Authentication protocol, Multi-factor authentication, Information Systems
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 32 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
