{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T08:33:43Z","timestamp":1709109223433},"reference-count":58,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T00:00:00Z","timestamp":1653523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"\nPurpose<\/jats:title>\nThis research aims to build a system that will continuously. This paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a behavioral biometrics continuous authentication (BBCA) system that is based on users keystroke dynamics and touch gestures on mobile devices. This paper aims to build a system that will continuously authenticate the user of a smartphone.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nSession authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, BBCA technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), which is based on the user\u2019s keystroke dynamics and touch gestures, using a multi-layer perceptron (MLP). Also, this paper introduces a new BB collection tool and proposes a methodology for the selection of an appropriate set of BB.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nThe system achieved the best results for keystroke dynamics which are 97.18% accuracy, 0.02% equal error rate, 97.2% true acceptance rate and 0.02% false acceptance rate.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nThis paper develops a new BB collection tool, named BioPrivacy, by which behavioral data of users on mobile devices can be collected. This paper proposes a methodology for the selection of an appropriate set of BB. This paper presents the development of a BBCA system based on MLP.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-12-2021-0212","type":"journal-article","created":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T12:51:44Z","timestamp":1653483104000},"page":"687-704","source":"Crossref","is-referenced-by-count":2,"title":["BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures"],"prefix":"10.1108","volume":"30","author":[{"given":"Ioannis","family":"Stylios","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Skalkos","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,5,26]]},"reference":[{"issue":"3","key":"key2022110716293055600_ref001","doi-asserted-by":"crossref","first-page":"1998","DOI":"10.1109\/COMST.2016.2537748","article-title":"Authentication of smartphone users using behavioral biometrics","volume":"18","year":"2016","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"key2022110716293055600_ref002","unstructured":"About-fraud (2019), \u201cBiometric authentication: the how and why [online]\u201d, available at: https:\/\/about-fraud.com\/biometric-authentication (accessed 21 February 2019)."},{"key":"key2022110716293055600_ref003","volume-title":"Continuous Authentication Using Biometrics: Data, Models, and Metrics","year":"2011"},{"key":"key2022110716293055600_ref004","first-page":"181","article-title":"Authentication system using behavioral biometrics through keystroke dynamics","year":"2014"},{"key":"key2022110716293055600_ref005","first-page":"25","article-title":"Surveying users' practices regarding mobile phones' security features","year":"2009"},{"key":"key2022110716293055600_ref006","article-title":"Yapay sinir a\u011flar\u0131n\u0131n jeodezide uygulamalar\u0131 \u00fczerine \u00f6neriler [suggestions on geodesy applications of artificial neural networks]","year":"2007"},{"key":"key2022110716293055600_ref007","first-page":"1","article-title":"Smudge attacks on smartphone touch screens","year":"2010"},{"key":"key2022110716293055600_ref008","article-title":"Hold and sign: a novel behavioral biometrics for smartphone user authentication conference: mobile security technologies (MoST) 2016 in conjunction with IEEE security and privacy (S&P 16)","year":"2016"},{"issue":"15","key":"key2022110716293055600_ref009","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1002\/sec.1265","article-title":"A changeable personal identification number-based keystroke dynamics authentication system on smartphones","volume":"9","year":"2016","journal-title":"Security and Communication Networks"},{"key":"key2022110716293055600_ref010","doi-asserted-by":"crossref","first-page":"57","DOI":"10.4018\/978-1-60566-725-6.ch003","article-title":"Performance evaluation of behavioral biometric systems","volume-title":"Behavioral Biometrics for Human Identification: Intelligent Applications","year":"2010"},{"issue":"7","key":"key2022110716293055600_ref011","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.cose.2005.08.003","article-title":"Authentication of users on mobile telephones \u2013 a survey of attitudes and practices","volume":"24","year":"2005","journal-title":"Computers and Security"},{"issue":"1","key":"key2022110716293055600_ref012","first-page":"1","article-title":"Authenticating mobile phone users using keystroke analysis","volume":"6","year":"2007","journal-title":"International Journal of Information Security"},{"issue":"3","key":"key2022110716293055600_ref013","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/S0167-4048(02)00304-8","article-title":"Acceptance of subscriber authentication methods for mobile telephony devices","volume":"21","year":"2002","journal-title":"Computers and Security"},{"issue":"2","key":"key2022110716293055600_ref014","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCE.2016.2521937","article-title":"Biometric technology and smartphones: a consideration of the practicalities of a broad adoption of biometrics and the likely impacts","volume":"5","year":"2016","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"key2022110716293055600_ref015","first-page":"135","article-title":"Continuous authentication of mobile user: fusion of face image and inertial measurement unit data, in","year":"2015","journal-title":"Int. Conf. Biometrics"},{"key":"key2022110716293055600_ref016","article-title":"Multi-Model authentication using keystroke dynamics for smartphones","year":"2018"},{"key":"key2022110716293055600_ref017","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-811318-9.00025-9","article-title":"MDHS\u2013LPNN: a hybrid FOREX predictor model using a legendre polynomial neural network with a modified differential harmony search technique","year":"2017","journal-title":"Chapter 25"},{"key":"key2022110716293055600_ref018","first-page":"114","article-title":"Learning to recognize touch gestures: recurrent vs. convolutional features and dynamic sampling","year":"2018"},{"key":"key2022110716293055600_ref019","unstructured":"Developers (2020), \u201cIntroduction to android: sensors overview, android developers [online]\u201d, available at: https:\/\/goo.gl\/MGWQy8 (accessed 21 February 2020)."},{"key":"key2022110716293055600_ref020","volume-title":"Biometrics at the Frontiers, Assessing the Impact on Society Technical Impact of Biometrics, Background Paper for the Institute of Prospective Technological Studies, DG JRC \u2013 Sevilla","year":"2005"},{"key":"key2022110716293055600_ref021","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1145\/3052973.3053032","article-title":"Evaluating behavioral biometrics for continuous authentication: Challenges and metrics","year":"2017"},{"key":"key2022110716293055600_ref022","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/EIConRus.2018.8317378","article-title":"User authentication via touch pattern recognition based on isolation forest","year":"2018"},{"issue":"1","key":"key2022110716293055600_ref023","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","article-title":"Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication","volume":"8","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"key2022110716293055600_ref024","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","year":"1997","journal-title":"Neural Computation"},{"key":"key2022110716293055600_ref025","first-page":"477","article-title":"Pores and ridges: fingerprint matching using level 3 features","volume":"4","year":"2006","journal-title":"Proc. Int. Conf. Pattern Recog"},{"key":"key2022110716293055600_ref026","article-title":"Perceptions of user authentication on mobile devices","year":"2007"},{"key":"key2022110716293055600_ref027","doi-asserted-by":"crossref","unstructured":"Krishnamoorthy, S. (2018), \u201cIdentification of user behavioural biometrics for authentication using keystroke dynamics and machine learning, electron\u201d, Theses Dissertations 7440.","DOI":"10.1145\/3230820.3230829"},{"issue":"11","key":"key2022110716293055600_ref028","doi-asserted-by":"publisher","first-page":"4417","DOI":"10.1007\/s12652-018-1123-6","article-title":"A continuous smartphone authentication method based on gait patterns and keystroke dynamics","volume":"10","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"9","key":"key2022110716293055600_ref029","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/MCOM.2010.5560598","article-title":"A survey of mobile phone sensing","volume":"48","year":"2010","journal-title":"IEEE Communications Magazine"},{"key":"key2022110716293055600_ref030","article-title":"Spatio-temporal LSTM with trust gates for 3D human action recognition","year":"2016"},{"key":"key2022110716293055600_ref031","volume-title":"Computational Intelligence","year":"1999"},{"issue":"2017","key":"key2022110716293055600_ref032","first-page":"28","article-title":"A survey on behavioral biometric authentication on smartphones","volume":"37","year":"2017","journal-title":"Journal of Information Security and Applications"},{"key":"key2022110716293055600_ref033","first-page":"1","article-title":"I can be you: questioning the use of keystroke dynamics as biometrics","year":"2013","journal-title":"Proc. NDSS"},{"key":"key2022110716293055600_ref034","first-page":"405","article-title":"Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users, in","year":"2015","journal-title":"Proc. Int. Workshop Recent Adv. Intrusion Detection"},{"key":"key2022110716293055600_ref035","article-title":"K-means++ vs behavioral biometrics: one loop to rule them all","year":"2018"},{"key":"key2022110716293055600_ref036","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.autcon.2011.09.002","article-title":"Supervised vs unsupervised learning for construction crew productivity pre-diction","volume":"22","year":"2012","journal-title":"Automation in Construction"},{"issue":"4","key":"key2022110716293055600_ref037","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2016.2555335","article-title":"Continuous user authentication on mobile devices: recent progress and remaining challenges","volume":"33","year":"2016","journal-title":"IEEE Signal Processing Magazine"},{"issue":"3","key":"key2022110716293055600_ref038","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/TIFS.2013.2244091","article-title":"Snoop-forge-replay attacks on continuous verification with keystrokes","volume":"8","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"key2022110716293055600_ref039","volume-title":"A Key to Your Heart: Biometric Authentication Based on ECG Signals. 4th Year Project Report Computer Science","year":"2018"},{"issue":"2","key":"key2022110716293055600_ref040","article-title":"Examining a large keystroke biometrics dataset for statistical-attack openings","volume":"16","year":"2013","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"key2022110716293055600_ref041","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2017.2737969","article-title":"Performance analysis of multi-motion sensor behavior for active smartphone authentication, in","volume":"13","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"key2022110716293055600_ref042","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/WiMOB.2011.6085412","article-title":"SenGuard: passive user identification on smartphones using multiple sensors","year":"2011"},{"key":"key2022110716293055600_ref043","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00055","article-title":"Adversarial gait detection on mobile devices using recurrent neural networks","year":"2018"},{"key":"key2022110716293055600_ref044","first-page":"1","article-title":"Multi-layer perceptron (MLP) neural network technique for offline handwritten gurmukhi character recognition","year":"2014"},{"issue":"4","key":"key2022110716293055600_ref045","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3390\/jcp1040036","article-title":"Users\u2019 privacy attitudes towards the use of behavioral biometrics continuous authentication (BBCA) technologies: a protection motivation theory approach","volume":"1","year":"2021","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"key2022110716293055600_ref050","article-title":"Users' attitudes on mobile devices: can users' practices protect their sensitive data?","year":"2016"},{"issue":"2","key":"key2022110716293055600_ref046","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2020-0196","article-title":"BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes","volume":"30","year":"2021","journal-title":"Information and Computer Security"},{"issue":"2021","key":"key2022110716293055600_ref047","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.inffus.2020.08.021","article-title":"Behavioral biometrics and continuous user authentication on mobile devices: a survey","volume":"66","year":"2021","journal-title":"Information Fusion"},{"key":"key2022110716293055600_ref048","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2021-0124","article-title":"Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research","year":"2022","journal-title":"Information and Computer Security"},{"key":"key2022110716293055600_ref049","doi-asserted-by":"publisher","article-title":"BioPrivacy: development of a keystroke dynamics continuous authentication system","year":"2022","DOI":"10.1007\/978-3-030-95484-0_10"},{"key":"key2022110716293055600_ref051","doi-asserted-by":"publisher","article-title":"A review of continuous authentication using behavioral biometrics","year":"2016","DOI":"10.1145\/2984393.2984403"},{"key":"key2022110716293055600_ref052","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/978-3-319-60801-3_27","article-title":"Multilayer perceptron (MLP)","volume-title":"Geomatic Approaches for Modeling Land Change Scenarios","year":"2018"},{"key":"key2022110716293055600_ref053","first-page":"289","article-title":"Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks","year":"2012"},{"issue":"2015","key":"key2022110716293055600_ref054","first-page":"110","article-title":"An implicit identity authentication system considering changes of gesture based on keystroke behaviors","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw"},{"issue":"2019","key":"key2022110716293055600_ref055","first-page":"9","article-title":"BehaveSense: continuous authentication for security-sensitive mobile apps using behavioral biometrics","volume":"84","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"key2022110716293055600_ref056","first-page":"000171","article-title":"Model construction and authentication algorithm of virtual keystroke dynamics for smart phone users","year":"2016"},{"key":"key2022110716293055600_ref057","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05452-0_14","article-title":"KeySens: passive user authentication through microbehavior modeling of soft keyboard interaction","year":"2013","journal-title":"MobiCASE"},{"issue":"9","key":"key2022110716293055600_ref058","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1378727.1389971","article-title":"Understanding user perspectives on biometric technology","volume":"51","year":"2008","journal-title":"Communications of the ACM"}],"container-title":["Information & Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2021-0212\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2021-0212\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T16:30:12Z","timestamp":1667838612000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2021-0212\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,26]]},"references-count":58,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5,26]]},"published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1108\/ICS-12-2021-0212"],"URL":"https:\/\/doi.org\/10.1108\/ics-12-2021-0212","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,26]]}}}