Keystroke-Based Biometric Authentication in Mobile Applications

Keystroke-Based Biometric Authentication in Mobile Applications

Fatima Kabli, Sad houari Nawal, Matoug Afaf
Copyright: © 2022 |Volume: 10 |Issue: 1 |Pages: 16
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781683182832|DOI: 10.4018/IJSI.303574
Cite Article Cite Article

MLA

Kabli, Fatima, et al. "Keystroke-Based Biometric Authentication in Mobile Applications." IJSI vol.10, no.1 2022: pp.1-16. http://doi.org/10.4018/IJSI.303574

APA

Kabli, F., Nawal, S. H., & Afaf, M. (2022). Keystroke-Based Biometric Authentication in Mobile Applications. International Journal of Software Innovation (IJSI), 10(1), 1-16. http://doi.org/10.4018/IJSI.303574

Chicago

Kabli, Fatima, Sad houari Nawal, and Matoug Afaf. "Keystroke-Based Biometric Authentication in Mobile Applications," International Journal of Software Innovation (IJSI) 10, no.1: 1-16. http://doi.org/10.4018/IJSI.303574

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Keystroke dynamics is the study of how people can be distinguished based on their typing rhythms. It is considered as a real alternative to several authentication mechanisms. In order to improve authentication security in mobile applications, especially mobile chat applications , we propose in this work an approach of user keystroke-based authentication which is based on two important mechanisms, firstly the authentication is done on the basis of a supervised classification model trained on the dynamic keystroke database (android platform) the prediction accuracy has reached high values. When the attacker used the same behavior as the legitimate user we are strengthening security by another authentication mechanism based on three parameters during the opening of a communication session between two users (the number of messages per session, connection time and inter-click time). The proposed system has shown satisfactory results by combining user behaviours and connection parameters during an open session between two users to reinforce the authentication aspect.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.