Advertisement

Behavioral Biometrics for Universal Access and Authentication

  • Liam M. MayronEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9175)

Abstract

Behavioral biometrics, such as gait, voice, handwriting, and keystroke dynamics can provide a method of authenticating users that is both secure and usable, particularly on mobile devices. Behavioral biometrics can often be collected in the background, without requiring a specific security task to be completed by the user. Many behavioral biometrics can be recorded with hardware that has already been deployed in many mobile devices. In this paper, we consider the use of behavioral biometrics for authentication in systems designed for universal access. Requirements for security and authentication are discussed, and several behavioral biometrics are introduced. Considerations for universal access are presented.

Keywords

Biometrics Behavioral biometrics Security Usability Authentication 

References

  1. 1.
    Al-Harby, F., Qahwaji, R., Kamala, M.: Users acceptance of secure biometrics authentication system: reliability and validate of an extended utaut model. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) Networked Digital Technologies, pp. 254–258. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Bahr, G., Mayron, L., Gacey, H.: Cyber risks to secure and private universal access. In: Stephanidis, C. (ed.) Universal Access in Human-Computer Interaction. Design for All and eInclusion, Lecture Notes in Computer Science, vol. 6765, pp. 433–442. Springer, Berlin Heidelberg (2011)Google Scholar
  3. 3.
    Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, pp. 199–203. ACM (2006)Google Scholar
  4. 4.
    Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. People and Computers, pp. 405–424. Springer, London (2000)Google Scholar
  5. 5.
    Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 426, pp. 233–271. The Royal Society (1989)Google Scholar
  6. 6.
    Bursztein, E., Bethard, S.: Decaptcha: breaking 75% of ebay audio captchas. In: Proceedings of the 3rd USENIX conference on Offensive technologies, p. 8. USENIX Association (2009)Google Scholar
  7. 7.
    Cohen, S., Ben-Asher, N., Meyer, J.: Towards information technology security for universal access. In: Stephanidis, C. (ed.) Universal Access in HCI, Part I, HCII 2011. LNCS, vol. 6765, pp. 443–451. Springer, Heidelberg (2011) Google Scholar
  8. 8.
    Cranor, L., Garfinkel, S.: Guest editors’ introduction: secure or usable? IEEE Secur. Priv. 2(5), 16–18 (2004)CrossRefGoogle Scholar
  9. 9.
    Dalla Bella, S., Palmer, C.: Personal identifiers in musicians’ finger movement dynamics. J. Cog. Neurosci. 18, G84 (2006)CrossRefGoogle Scholar
  10. 10.
    Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 715–724. ACM (2011)Google Scholar
  11. 11.
    Gafurov, D.: A survey of biometric gait recognition: approaches, security and challenges. In: Annual Norwegian Computer Science Conference, pp. 19–21. Citeseer (2007)Google Scholar
  12. 12.
    Gafurov, D., Helkala, K., Søndrol, T.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 51–59 (2006)CrossRefGoogle Scholar
  13. 13.
    Gamboa, H., Fred, A.: A behavioral biometric system based on human-computer interaction. In: Defense and Security, pp. 381–392. International Society for Optics and Photonics (2004)Google Scholar
  14. 14.
    Greene, S.: Security Policies and Procedures: Principles and Practices (Prentice Hall Security Series). Prentice-Hall Inc, Upper Saddle River (2005)Google Scholar
  15. 15.
    Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: Itsa hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS) (2014)Google Scholar
  16. 16.
    Hwang, S., Cho, S., Park, S.: Keystroke dynamics-based authentication for mobile devices. Comput. Secur. 28(1), 85–93 (2009)CrossRefGoogle Scholar
  17. 17.
    Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75–78 (2004)CrossRefGoogle Scholar
  18. 18.
    Jain, A., Ross, A., Nandakumar, K.: Introduction to Biometrics. Springer, US (2011)CrossRefGoogle Scholar
  19. 19.
    Kumar, N.: Password in practice: a usability study. J. Global Res. Comput. Sci. 2(5), 107–112 (2011)Google Scholar
  20. 20.
    Lee, L., Grimson, W.E.L.: Gait analysis for recognition and classification. In: Proceedings Fifth IEEE International Conference on Automatic Face and Gesture Recognition, pp. 148–155. IEEE (2002)Google Scholar
  21. 21.
    Lopresti, D.P., Raim, J.D.: The effectiveness of generative attacks on an online handwriting biometric. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1090–1099. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  22. 22.
    Mayron, L.M., Hausawi, Y., Bahr, G.S.: Secure, usable biometric authentication systems. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013, Part I. LNCS, vol. 8009, pp. 195–204. Springer, Heidelberg (2013) Google Scholar
  23. 23.
    Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351–359 (2000)CrossRefGoogle Scholar
  24. 24.
    Pfleeger, C., Pfleeger, S.: Security in Computing. Prentice Hall PTR, Englewood Cliffs (2006)Google Scholar
  25. 25.
    Reynolds, D.A.: An overview of automatic speaker recognition. In: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. S.4072–S.4075 (2002)Google Scholar
  26. 26.
    Sasse, M.: Computer security: anatomy of a usability disaster, and a plan for recovery. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems. Citeseer (2003)Google Scholar
  27. 27.
    Sasse, M., Brostoff, S., Weirich, D.: Transforming the weakest linka human/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122–131 (2001)CrossRefGoogle Scholar
  28. 28.
    Schneier, B.: Two-factor authentication: too little, too late. Commun. ACM 48(4), 136 (2005)CrossRefGoogle Scholar
  29. 29.
    Stephanidis, C.: The Universal Access Handbook. CRC Press, Boca Raton (2009)CrossRefGoogle Scholar
  30. 30.
    Toledano, D., Fernández Pozo, R., Hernández Trapote, Á., Hernández Gómez, L.: Usability evaluation of multi-modal biometric verification systems. Interact. Comput. 18(5), 1101–1122 (2006)CrossRefGoogle Scholar
  31. 31.
    Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric hash based on statistical features of online signatures. In: Proceedings of 16th International Conference on Pattern Recognition, vol. 1, pp. 123–126. IEEE (2002)Google Scholar
  32. 32.
    Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-based character recognition via web security measures. Science 321(5895), 1465–1468 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  33. 33.
    Wang, L., Tan, T., Ning, H., Hu, W.: Silhouette analysis-based gait recognition for human identification. IEEE Trans. Pattern Analy. Mach. Intell. 25(12), 1505–1518 (2003)CrossRefGoogle Scholar
  34. 34.
    Yampolskiy, R.V.: Mimicry attack on strategy-based behavioral biometric. In: Fifth International Conference on Information Technology: New Generations, ITNG 2008, pp. 916–921. IEEE (2008)Google Scholar
  35. 35.
    Yampolskiy, R.V., Govindaraju, V.: Behavioural biometrics: a survey and classification. Int. J. Biom. 1(1), 81–113 (2008)CrossRefGoogle Scholar
  36. 36.
    Yan, J., et al.: Password memorability and security: empirical results. IEEE Secur. Priv. 5, 25–31 (2004)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Arizona State UniversityTempeUSA

Personalised recommendations