A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

https://doi.org/10.1016/j.jss.2011.12.044Get rights and content

Abstract

Since touch screen handheld mobile devices have become widely used, people are able to access various data and information anywhere and anytime. Most user authentication methods for these mobile devices use PIN-based (Personal Identification Number) authentication, since they do not employ a standard QWERTY keyboard for conveniently entering text-based passwords. However, PINs provide a small password space size, which is vulnerable to attacks. Many studies have employed the KDA (Keystroke Dynamic-based Authentication) system, which is based on keystroke time features to enhance the security of PIN-based authentication. Unfortunately, unlike the text-based password KDA systems in QWERTY keyboards, different keypad sizes or layouts of mobile devices affect the PIN-based KDA system utility. This paper proposes a new graphical-based password KDA system for touch screen handheld mobile devices. The graphical password enlarges the password space size and promotes the KDA utility in touch screen handheld mobile devices. In addition, this paper explores a pressure feature, which is easy to use in touch screen handheld mobile devices, and applies it in the proposed system. The experiment results show: (1) EER is 12.2% in the graphical-based password KDA proposed system. Compared with related schemes in mobile devices, this effectively promotes KDA system utility; (2) EER is reduced to 6.9% when the pressure feature is used in the proposed system. The accuracy of authenticating keystroke time and pressure features is not affected by inconsistent keypads since the graphical passwords are entered via an identical size (50 mm × 60 mm) human–computer interface for satisfying the lowest touch screen size and a GUI of this size is displayed on all mobile devices.

Highlights

► A graphical-based password KDA system is proposed for touch screen devices. ► The pressure feature is explored in touch screen handheld mobile devices. ► The pressure feature increases the system utility from EER = 12.2% to EER = 6.9%. ► The performance is excellent and is suitable for low-power mobile devices.

Introduction

Whenever people use services such as e-bank and e-mail, servers should have the ability to authenticate the users’ identities. Otherwise, anyone can easily impersonate a legal user to login to the server. Password-based authentication schemes are simple and practical solutions to user identification because they allow people to choose their own passwords without any device to generate or store them. For personal computers, passwords consist of letters, numbers, and special punctuations on a standard QWERTY keyboard. This is called text-based (alphanumeric-based) password authentication. Handheld mobile devices do not have standard QWERTY keyboard to conveniently enter text-based passwords. Mobile devices often use numeric passwords, which is called PIN-based (Personal Identification Number) authentication. Though the password space size of text-based passwords is larger than that of PINs (i.e., the password space size of an 8-character text-based password and an 8-digital PIN are 648  2.8 × 1014 and 108, respectively), text-based passwords are preferred natural language phrases that people can recognize easily and are therefore susceptible to dictionary attacks. On the other hand, PIN-based authentication is widely used in mobile devices, but it provides a small password space size and therefore compromises security.

The KDA (Keystroke Dynamic-based Authentication) system was first proposed by Gaines et al. (1980). It is a biometric measurement method to provide additional security for text-based passwords. Many studies (Araújo et al., 2005, Bergadano et al., 2002, Bleha et al., 1990, Boechat et al., 2007, Chang and Yang, in press, Haider et al., 2000, Harun et al., 2010, Hwang et al., 2009b, Killourhy and Maxion, 2009, Ru and Eloff, 1997, Shih and Lin, 2008, Xi et al., 2011) have been proposed to improve the text-based password KDA system utility. KDA systems confirm the correctness of passwords and also identify users based on individual password keystroke time features. The keystroke time features include the duration of a keystroke (keystroke hold time) and the interval of the keystrokes (keystroke latency time). Even if the password is revealed by dictionary attacks or shoulder surfing attacks, the probability of breaking authentication is reduced. The KDA system has the following advantages. It is low-cost with no extra device to obtain the user's features, and does not require complex computations to capture the user's features. Since the process of capturing features is done when the user enters his or her password, it does not create any additional burden on users. Compared with other biometric authentication methods such as fingerprints, eye scan, iris, and signature, the KDA system is simple and useful for providing additional security in identity verification.

As is well known, mobile devices are widely used for accessing various data and information. Campisi et al. (2009) proposed a text-password KDA system that uses a cellular phone keypad. On the other hand, many studies (Clarke and Furnell, 2007a, Clarke and Furnell, 2007b, Hwang et al., 2009a) have applied KDA systems to enhance the security of PIN-based authentication in mobile devices. However, the sizes or layouts of keypads of the mobile devices produced by different manufacturers are inconsistent. A user may not get used to entering his or her PIN or text-based password through different mobile devices. This will result in the user's features being entered inconsistently and KDA system verification failing if users enter their PINs or text-based passwords through difference mobile devices. Consequently, the KDA system utility for mobile devices (Campisi et al., 2009, Clarke and Furnell, 2007a, Clarke and Furnell, 2007b, Hwang et al., 2009a) is worse than that for QWERTY keyboards (Killourhy and Maxion, 2009, Shih and Lin, 2008).

This paper develops a novel graphical-based password KDA system to improve PIN-based authentication for mobile devices. The password space size of the proposed system is larger than those of PIN-based authentication schemes. Regardless of the size of the user's mobile touch screen, users enter their graphical passwords through clicking or touching an identical human–computer interface. Therefore, the accuracy of users authentication is not affected by inconsistent keypads. In addition, this paper explores the pressure feature, which is a new biometric keystroke feature found in touch screens. The proposed graphical-based password KDA system is implemented in an Android-compatible phone. Serial experiments show the utility of the proposed graphical-based password KDA system is better than the related text-based password and PIN-based KDA systems (Campisi et al., 2009, Clarke and Furnell, 2007a, Clarke and Furnell, 2007b). Moreover, when the pressure feature is applied in the proposed system, it further promotes system utility.

The organization of this paper is as follows. Section 2 reviews and discusses studies on graphical-based password authentication and the PIN-based KDA system, respectively. Section 3 proposes the architecture of the methodology, which includes the enrollment phase, the classifier building phase, and the authentication phase. The pressure feature is also introduced in this section. Section 4 presents the experimental results of this paper and compares them with other related studies. At the same time, the performance of the proposed system is presented. It is suitable for low-power mobile devices. Finally, conclusions are given in Section 5.

Section snippets

Related works

To improve on the drawbacks of PIN-based KDA systems, this paper first combines a graphical password with the KDA system. This section introduces these two related studies in 2.1 Graphical-based password authentication, 2.2 Keystroke Dynamic-based Authentication, respectively.

Methodology

This paper develops a graphical-based password KDA system for touch screen mobile devices. After observing users using touch screen handheld mobile devices, we found users enter their data through the touch screen in characteristic fashion. The force of each person clicking or touching the touch panel is not necessarily the same when they enter their data, thus, the system captures different pressures from the touch panels on mobile devices. Therefore, this paper assumes the pressure feature

Experimental results

This paper provides a graphical-based password KDA system developed by Java language and implemented in Android-compatible devices. The handheld mobile devices used in the experiment were a Motorola Milestone (with an ARM Cortex A8 550 MHz CPU and 256 MB memory), an HTC Desire HD (with a Qualcomm 8255 Snapdragon 1 GHz CPU and 768 MB memory), and a Viewsonic Viewpad (with an Intel Atom N455 1.66 GHz CPU and 1 GB memory). The features in our system were obtained by Android API MotionEvent function

Conclusion

In this paper, we proposed a graphical-based password KDA system for touch screen handheld mobile devices. A user enters his or her graphical password through an identical human–computer interface and therefore the user's keystroke features will not be affected if the user uses different devices. In the experiment, the novel pressure feature applied to touch screens could improve data quality and further promote KDA system utility. The time and pressure features are obtained when a user enters

Acknowledgments

I would like to thank the referees for many valuable comments and suggestions which have resulted in several improvements of the presentation of the paper. This research was partially supported by the National Science Council, Taiwan, ROC, under contract nos.: NSC100-2221-E-018-025, NSC100-2221-E-018-034 and NSC100-2622-E-018-004-CC3.

Ting-Yi Chang received his M.S. from the Graduate Institute of Computer Science and Information Engineering at Chaoyang University of Technology, and his Ph.D in the Department of Computer Science at National Chiao Tung University, Taiwan. Currently, he is an Associate Professor with the Graduate Institute of e-Learning, National Changhua University, Taiwan. His current research interests include artificial intelligence, e-Learning, information security, cryptography, and mobile communications.

References (36)

  • BoechatG.C. et al.

    Authentication personal

  • BrostoffS. et al.

    Are passfaces more usable than passwords? a field trial investigation

  • CampisiP. et al.

    User authentication using keystroke dynamics for cellular phones

    IET Signal Processing

    (2009)
  • Chang, T.Y., Yang, Y.J. A simple keystroke dynamics-based authentication system using means and standard deviation....
  • ChangT.Y. et al.

    A personalized rhythm click-based authentication system

    Information Management and Computer Security

    (2010)
  • ChernickM.R.

    Bootstrap Methods: A Guide for Practitioners and Researchers. Wiley Series in Probability and Statistics

    (2007)
  • ClarkeN.L. et al.

    Authenticating mobile phone users using keystroke analysis

    International Journal of Information Security

    (2007)
  • DhamijaR. et al.

    Déjà vu: A user study using images for authentication

  • Cited by (105)

    • Utilizing binary code to improve usability of pressure-based authentication

      2021, Computers and Security
      Citation Excerpt :

      In addition, we convert a pressure-based password to a digit number in order to reduce the learning time. Instead of traditional textual passwords, Chang et al. used a sequence of user selected photos as a graphical password, which is combined with keystroke dynamic to implement an authentication system for mobile devices, and concluded that the pressure feature of keystroke can reduce the error rate (Chang et al., 2012). Orozco et al. proposed a graphical password as connected nodes on a grid and used pressure as an extra feature in characterizing the password (Orozco et al., 2006; Malek et al., 2006).

    • Keyword-based approach for recognizing fraudulent messages by keystroke dynamics

      2020, Pattern Recognition
      Citation Excerpt :

      Messerman et al.’s study [26] required up to 12 months of training. According to our investigation in our previously performed keystroke-dynamics-related experiments [8,9,36], we observed that the users felt bored and were unwilling to use an authentication system if the training time was greater than 30 min. Furthermore, our investigation demonstrated that approximately 90% of the users were unwilling to use an authentication system if the training time was longer than 30 min, even if such a system could protect them from fraudulent messages.

    • An XML transformed method to improve effectiveness of graphical password authentication

      2020, Journal of King Saud University - Computer and Information Sciences
    • TAPSTROKE: A novel intelligent authentication system using tap frequencies

      2019, Expert Systems with Applications
      Citation Excerpt :

      Enhancements in authentication protocols providing additional security are definitely more crucial for touchscreens, since the majority of the touchscreen devices are mobile and thus easy to be stolen. Therefore, in recent years, there are many papers published on user verification (Angulo & Wästlund, 2012; Shahzad, Zahid & Farooq, 2009; Zheng, Bai, Huang & Wang, 2012) biometric identification (Schaub, Deyhle & Weber, 2012; Kwapisz, Weiss & Moore, 2010), gesture analysis (Shahzad, Liu & Samuel, 2013; Sae-Bae, Ahmed, Isbister & Memon, 2012), authentication (Chang, Tsai & Lin, 2012; Maiorana, Campisi, González-Carballo & Neri, 2011; Rao, Aparna, Akash & Mounica, 2014; De Luca, Hang, Brudy, Lindner & Hussmann, 2012) and touchstroke analysis (Kambourakis, Damopoulos, Papamartzivanos & Pavlidakis, 2014). The most remarkable studies published in recent years are (Jeanjaitrong & Bhattarakosol, 2013; Tasia, Chang, Cheng & Lin, 2014; Do et al., 2014; Trojahn, Arndt & Ortmeier, 2013; Rogowski, Saeed, Rybnik, Tabedzki & Adamski, 2013; Bours & Masoudian, 2014; Frank, Biedert, Ma, Martinovic & Song, 2013; Sae-Bae, Memon, Isbister & Ahmed, 2014; Zhao, Feng, Shi & Kakadiaris, 2014; Alpar & Krejcar, 2015a; Alpar & Krejcar, 2015b) that all introduce several enhancements for touchscreen authentication systems.

    View all citing articles on Scopus

    Ting-Yi Chang received his M.S. from the Graduate Institute of Computer Science and Information Engineering at Chaoyang University of Technology, and his Ph.D in the Department of Computer Science at National Chiao Tung University, Taiwan. Currently, he is an Associate Professor with the Graduate Institute of e-Learning, National Changhua University, Taiwan. His current research interests include artificial intelligence, e-Learning, information security, cryptography, and mobile communications.

    Cheng-Jung Tsai was born in Tainan, Taiwan, Republic of China, 1973. He received the B.S. degree in mathematics and science education from National Ping Tung University of Education in 1995, the M.S. degree in information education from National University of Tainan in 2000, and the Ph.D degree in computer science and information engineering from National Chiao Tung University in 2008. Currently, he is an Assistant Professor in the Graduate Institute of Statistics and Information Sciencethe, National Changhua University, Taiwan. His current research interests include data mining, information security, and e-learning.

    Jyun-Hao Lin received his M.S. degree from the Graduate Institute of e-Learning at National Changhua University, Taiwan. His research interests include keystroke dynamic systems.

    View full text