International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024
p-ISSN: 2395-0072
www.irjet.net
The Significance of Continuous User Authentication on Mobile Gadgets Yashashree Hanumant Khanolkar Assistant Professor, Dept. of Computer Science, Sant Rawool Maharaj Mahavidyalaya, Kudal, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the rapidly evolving landscape of mobile
Pressure: Amount of pressure applied to each key (in devices with pressure-sensitive keyboards). Applications: Secure access to systems. Detection of unauthorized access during active sessions. Challenges: Variability in typing due to fatigue, injury, or mood. Difficulty in capturing accurate data on mobile devices.
technology, ensuring the security of personal and sensitive information is paramount. Continuous user authentication represents a significant advancement in mobile security, offering ongoing verification of user identity beyond the initial login. This paper explores the importance, methods, benefits, and challenges of continuous user authentication on mobile devices. It provides a comprehensive review of current technologies and research, highlighting the critical role continuous authentication plays in enhancing security and user experience in mobile ecosystems.
1.1.2 Mouse Dynamics Description: Mouse dynamics involve tracking and analyzing the way a user interacts with a mouse. This includes movement patterns, click behaviors, and scrolling habits. Characteristics Analyzed: Movement Patterns: Speed, acceleration, and direction of mouse movements. Click Patterns: Timing and frequency of mouse clicks. Drag and Drop Actions: Manner of performing drag-anddrop operations. Scroll Behavior: Speed and frequency of scrolling actions. Applications: Continuous authentication in desktop environments. Detection of anomalous behavior indicating potential fraud. Challenges: Limited applicability to touchscreen devices. Environmental factors (e.g., surface texture) can affect mouse behavior.
1.INTRODUCTION With the increasing reliance on mobile devices for a wide range of activities, from communication to banking, the security of these devices has become a major concern. Traditional authentication methods, such as passwords and PINs, provide a one-time verification that can be easily compromised. Continuous user authentication (CUA) offers a dynamic and persistent security solution by continuously monitoring and verifying the user's identity throughout the device's usage session. This paper delves into the significance of CUA, examining its potential to mitigate security risks and enhance user convenience.
1.1 Methods of Continuous User Authentication Behavioral biometrics are an advanced method of continuous user authentication that relies on analyzing unique patterns in a user's behavior. This approach leverages the inherent uniqueness in how individuals interact with devices and systems, providing a robust and continuous verification mechanism. Here’s an in-depth look at various aspects of behavioral biometrics:
1.1.3 Touch Dynamics Description: Touch dynamics analyze user interactions with touchscreens. This includes swiping, tapping, and multitouch gestures. Characteristics Analyzed: Swipe Patterns: Speed, length, and direction of swipe gestures. Tap Behavior: Pressure and duration of taps. Multi-touch Gestures: Use of pinch, zoom, and rotation gestures. Typing Patterns: Analysis of on-screen keyboard usage similar to keystroke dynamics. Applications: Secure access to mobile devices. Continuous user verification in apps and mobile browsers. Challenges: Variability in touch behavior due to different device sizes and touch interfaces. Sensitivity to environmental factors like humidity and screen cleanliness.
1.1.1 Keystroke Dynamics Description: Keystroke dynamics analyze the rhythm and patterns of typing on a keyboard. This method captures various typing characteristics that are unique to each individual. Characteristics Analyzed: Typing Speed: Overall typing speed measured in characters per minute. Dwell Time: Duration each key is pressed. Flight Time: Time taken to move from one key to another. Error Patterns: Common mistakes and correction patterns.
© 2024, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 2209