Show simple item record

dc.contributor.authorSaevanee, H
dc.contributor.authorClarke, Nathan
dc.contributor.authorFurnell, Steven
dc.contributor.authorBiscione, V
dc.date.accessioned2017-11-29T23:48:48Z
dc.date.available2017-11-29T23:48:48Z
dc.date.issued2015-09
dc.identifier.issn0167-4048
dc.identifier.issn1872-6208
dc.identifier.urihttp://hdl.handle.net/10026.1/10346
dc.description.abstract

As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the fundamental issue of usable and secure authentication through utilizing biometric-based techniques to continuously verify user identity. This paper proposes a novel text-based multimodal biometric approach utilizing linguistic analysis, keystroke dynamics and behavioural profiling. Experimental investigations show that users can be discriminated via their text-based entry, with an average Equal Error Rate (EER) of 3.3%. Based on these findings, a framework that is able to provide robust, continuous and transparent authentication is proposed. The framework is evaluated to examine the effectiveness of providing security and user convenience. The result showed that the framework is able to provide a 91% reduction in the number of intrusive authentication requests required for high security applications.

dc.format.extent234-246
dc.languageen
dc.language.isoen
dc.publisherElsevier BV
dc.subjectBiometrics
dc.subjectTransparent authentication
dc.subjectMultimodal biometrics
dc.subjectLinguistic profiling
dc.subjectKeystroke dynamics
dc.subjectBehavioural profiling
dc.subjectMobile device
dc.titleContinuous user authentication using multi-modal biometrics
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000367124600015&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume53
plymouth.publication-statusPublished
plymouth.journalComputers & Security
dc.identifier.doi10.1016/j.cose.2015.06.001
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.identifier.eissn1872-6208
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1016/j.cose.2015.06.001
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV