Open Access Open Access  Restricted Access Subscription Access

Advanced Authentication Scheme Using a Predefined Keystroke Structure


Affiliations
1 Computer Science Department, Jerash University, Jerash, 26150, Jordan
 

This paper presents an advanced keystroke authentication model improving users' validation strength. The proposed system is based on defining a keystroke structure for each authorized user, to be used in the user login attempts. This structure is composed based on two components; the user's typing time deviation thresholds; and a unique user secret code which is distributed between password's characters based on time distances. The strength of the proposed method depends primarily on the amount of information distributed among typing time, and on reducing the deviation of these times. During the preliminary evaluation, it was confirmed that the proposed system has achieved an improved authentication level, and the system model was highly accepted between participating users.

Keywords

Authentication, Keystroke, Dynamics, Predefined Structure, Time Distance.
User
Notifications
Font Size

Abstract Views: 264

PDF Views: 128




  • Advanced Authentication Scheme Using a Predefined Keystroke Structure

Abstract Views: 264  |  PDF Views: 128

Authors

Abdulameer K. Hussain
Computer Science Department, Jerash University, Jerash, 26150, Jordan
Mohammad M. Alnabhan
Computer Science Department, Jerash University, Jerash, 26150, Jordan

Abstract


This paper presents an advanced keystroke authentication model improving users' validation strength. The proposed system is based on defining a keystroke structure for each authorized user, to be used in the user login attempts. This structure is composed based on two components; the user's typing time deviation thresholds; and a unique user secret code which is distributed between password's characters based on time distances. The strength of the proposed method depends primarily on the amount of information distributed among typing time, and on reducing the deviation of these times. During the preliminary evaluation, it was confirmed that the proposed system has achieved an improved authentication level, and the system model was highly accepted between participating users.

Keywords


Authentication, Keystroke, Dynamics, Predefined Structure, Time Distance.