Suscripción a Biblioteca: Guest
Portal Digitalde Biblioteca Digital eLibros Revistas Referencias y Libros de Ponencias Colecciones
Telecommunications and Radio Engineering
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN Imprimir: 0040-2508
ISSN En Línea: 1943-6009

Volumen 79, 2020 Volumen 78, 2019 Volumen 77, 2018 Volumen 76, 2017 Volumen 75, 2016 Volumen 74, 2015 Volumen 73, 2014 Volumen 72, 2013 Volumen 71, 2012 Volumen 70, 2011 Volumen 69, 2010 Volumen 68, 2009 Volumen 67, 2008 Volumen 66, 2007 Volumen 65, 2006 Volumen 64, 2005 Volumen 63, 2005 Volumen 62, 2004 Volumen 61, 2004 Volumen 60, 2003 Volumen 59, 2003 Volumen 58, 2002 Volumen 57, 2002 Volumen 56, 2001 Volumen 55, 2001 Volumen 54, 2000 Volumen 53, 1999 Volumen 52, 1998 Volumen 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.60
pages 987-1003


A. S. Nechiporenko
Kharkiv National University of Radio Engineering and Electronics, 14, Nauka Ave, Kharkiv, 61166, Ukraine
E.V. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
M.S. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine


This paper analyzes the current state of the problem on user authentication, in particular, users of mobile devices. A method for authenticating users of mobile devices has been suggested and discussed in details. The description of the developed software that implements the suggested method is given. The experiment has been planned and conducted with the developed authentication method to determine the indicators FAR and FRR. The analysis of the effectiveness of the developed user authentication method has been carried out and it has been compared with existing analogues.


  1. Wikipedia. Information explosion URL [Electronic resource]. URL: (access date: 12/17/2018).

  2. Central Intelligence Agency The World Factbook URL URL:

  3. Ivanov, A.I., (2000) Biometric Authentication Based on the Dynamics of Subconscious Movements, Penza, Russia: PGU Publishing House, 178 p., (in Russian).

  4. Ivanov, A.I., (2004) Neural Network Biometric Authentication Algorithms, Book 15, series ''Neurocomputers and their Applications'', Moscow, Russia: Radio Engineering, 144 p., (in Russian).

  5. Ivanov, A.I. and Malygina, E.A. (2015) Biometric authentication of identity: inversion of matrices of neural network functional in Hamming metric space, Information security issues, 1, pp. 23-29, (in Russian).

  6. Ivanov, A.I., (2016) Multidimensional Neural Network Processing of Biometric Data with Software Reproduction of Quantum Superposition Effects, Penza, Russia: Publishing house Penzensky Scientific Research Electrotechnical Institute, 133 p., (in Russian).

  7. Bryukhomitsky, Yu.A., Zverev, EM, and Kazarin, M.N., (2005) User authentication using keyboard handwriting based on interchangeable virtual keyboards, Journal Information Countering the threat of Terrorism, 4, pp. 141-146, (in Russian).

  8. Zayats, VM. and Ulytsky, O.O., (2000) Algorithms and software for human recognition system based on manual reactions, Visnyk Derzh. Universytetu Lvivs'ka Politekhnika. Computer Engineering and Information Technologies, 392, pp.73-76, (in Ukrainian).

  9. Zayats, V.M., (2006) Approach to describing the computer user authentication system, Computer Printing Technologies, pp. 46-53, (in Ukrainian).

  10. Zayats, VM, and Zayats, M.M., (2005) Mathematical description of computer user authentication system, Physical-Mathematical Modeling and Information Technologies, Lviv, 1, pp. 146-152, (in Ukrainian).

  11. Chalaya, L.E., (2004) User Authentication Model by Keyboard Handwriting, Artificial Intelligence, 4, pp. 811-817, (in Ukrainian).

  12. Chalaya, L.E., (2007) A method of forming a database of biometric standards for authenticating users of information systems by behavioral characteristics, Bionics of intelligence, 2(67), pp. 78-83, (in Ukrainian).

  13. LTvia, C.F., Ara'ujo Luiz, H.R., Sucupira, Miguel Gustavo Liz'arraga, Lee Luan Ling, and Jo'ao Baptista T. Yabuuti, (2004) User Authentication through Typing Biometrics Features, Lecture Notes in Computer Science, 3072, pp. 694-700.

  14. De Luca, A., Hang, A., Brudy, F., Lindner, Ch., and Hussmann, H., (2012), Touch Me Once and I Know it's You! Implicit Authentication Based on Touch Screen Patterns, CHI ACM, pp. 987-996.

  15. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M., (2010) Smudge attacks on smartphone touch screens, USENIX 4th Workshop WOOT.

  16. Ball, R.M., Connel, J.H., Pankanti, S., Ratha, N.K., and Senor, E.W., (2007) Guide to Biometrics, Moscow, Russia: Tekhnosfera, 368 p., (in Russian).

  17. Rabiner, L., and Juang, B.H., (1993) Fundamentals of Speech Recognition, Prentice Hall PTR, 507 p.

  18. Eamonn, J. and Keogh, M.J., (2018) Pazzani. Derivative Dynamic Time Warping, International Journal of Research in Electronicals and Computer Engineering, 5, pp. 524-528.

  19. Senin, P., (2008) DTW Algorithm Review. Information and Computer Science Department, Honolulu, 23.

  20. Stan, S. and ChanFast, P., (2017) DTW: Toward Accurate Dynamic Time Warping in Linear Time and Space, International Journal of Science Technology Management and Research, 7, pp. 1-5.

  21. Ghazi Al-Naymat, and Sanjay Chawla, Javid Taheri, (2009) Sparse DTW: A novel approach to speed up, The 2009 Australasian Data Mining, 10, pp. 117-127.

  22. Niels, R., (2004) Dynamic Time Warping: An intuitive way of handwriting recognition? MASTER THESIS, 95 p.

  23. Lin, D.-T., (1997) Computer-access authentication with neural network based keystroke identity verification, International Conference Neural Networks, 1, pp. 174-178.

  24. Obaidat, M. and Sadoun, B., (1997) Verification of computer users using keystroke dynamics, In Systems, Man, and Cybernetics, Part B: Cybernetics, 27(2), pp. 261-269.

  25. Monrose, F. and Rubin, A.D., (1997) Authentication via keystroke dynamics, Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA: ACM, 13, pp. 48-56.

  26. Obaidat, M. and Macchiarolo, D., (1993) An online neural network system for computer access security, Industrial Electronics, IEEE Transactions, 40(2), pp. 235-242.

  27. Zahid, S., Shahzad, M., Khayam, S.A., and Farooq, M., (2009) Keystrokebased user identification on smart phones, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Berlin, 9, pp. 224-243.

  28. Shanmugapriya, D. and Padmavathi, G., (2009) The Third International Conference on Mobile Services, Resources, and Users dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, 5(1), pp. 189-196.

  29. Buchoux, A. and Clarke, N.L., (2008) Deployment of keystroke analysis on a smartphone, Proceedings of the 6th Australian Information Security & Management Conference. 6, pp. 40-47.

  30. Banerjee, S. and Woodard, D., (2012) Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7, pp. 116-139.

  31. Umphress., D. and Williams, G., (1985) Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, 23, pp. 263-273.

  32. Joyce, R. and Gupta, G., (1990) Identity authentication based on keystroke latencies, Commun. ACM. New York, NY, USA, 33, pp. 168-176.

  33. Ord, T. and Furnell, S., (2000) User authentication for keypad-based devices using keystroke analysis, Proc. 2nd Int'l Network Conf (INC 2000), 2, pp. 263-272.

  34. Clarke, N.L. and Furnell, S.M., (2006) Authenticating mobile phone users using keystroke analysis, Int. J. Inf. Secur., Berlin, Heidelberg: Springer-Verlag, 6, pp. 1-14.

  35. Saevanee, H. and Bhattarakosol, P., (2009) Authenticating user using keystroke dynamics and finger pressure, Consumer Communications and Networking Conference 6th IEEE, 6, pp. 1-2.

  36. Trojahn, M. and Ortmeier, F., (2012) Biometric authentication through a virtual keyboard for smartphones, International Journal of Computer Science & Information Technology (IJCSIT), 8.

  37. pp. 1-12.

Articles with similar content:

Probabilistic-Mathematical Models for Formation of Information Flows in Aircraft Fire Alarm System
Journal of Automation and Information Sciences, Vol.51, 2019, issue 7
Ali Al-Ammori , Andrey N. Dmytrychenko , Hasan A. Al-Ammori
Telecommunications and Radio Engineering, Vol.72, 2013, issue 13
V. V. Voronin, V. A. Frantz, V. I. Marchuk
Telecommunications and Radio Engineering, Vol.78, 2019, issue 14
I. S. Tvoroshenko, V. О. Gorokhovatskyi
Strong Solvability and Strong Feasibility of Fuzzy Linear Systems of Inequalities
Journal of Automation and Information Sciences, Vol.46, 2014, issue 12
Alexandra O. Yemets, Oleg A. Iemets
Increasing of the Efficiency of Signal Expansion within the Redundant Basis
Telecommunications and Radio Engineering, Vol.65, 2006, issue 11-15
V. V. Zhuravel