Доступ предоставлен для: Guest
Портал Begell Электронная Бибилиотека e-Книги Журналы Справочники и Сборники статей Коллекции
Telecommunications and Radio Engineering
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009

Том 79, 2020 Том 78, 2019 Том 77, 2018 Том 76, 2017 Том 75, 2016 Том 74, 2015 Том 73, 2014 Том 72, 2013 Том 71, 2012 Том 70, 2011 Том 69, 2010 Том 68, 2009 Том 67, 2008 Том 66, 2007 Том 65, 2006 Том 64, 2005 Том 63, 2005 Том 62, 2004 Том 61, 2004 Том 60, 2003 Том 59, 2003 Том 58, 2002 Том 57, 2002 Том 56, 2001 Том 55, 2001 Том 54, 2000 Том 53, 1999 Том 52, 1998 Том 51, 1997

Telecommunications and Radio Engineering

DOI: 10.1615/TelecomRadEng.v78.i11.60
pages 987-1003


A. S. Nechiporenko
Kharkiv National University of Radio Engineering and Electronics, 14, Nauka Ave, Kharkiv, 61166, Ukraine
E.V. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine
M.S. Gubarenko
Kharkiv National University of Radio Electronics, 14 Nauka Ave, Kharkiv 61166, Ukraine

Краткое описание

This paper analyzes the current state of the problem on user authentication, in particular, users of mobile devices. A method for authenticating users of mobile devices has been suggested and discussed in details. The description of the developed software that implements the suggested method is given. The experiment has been planned and conducted with the developed authentication method to determine the indicators FAR and FRR. The analysis of the effectiveness of the developed user authentication method has been carried out and it has been compared with existing analogues.


  1. Wikipedia. Information explosion URL [Electronic resource]. URL: https://ru.wikipedia.org/wiki/Informational_explosion (access date: 12/17/2018).

  2. Central Intelligence Agency The World Factbook URL URL: https://www.cia.gov/library/publications/resources/the-world-factbook/rankorder/2151rank.html.

  3. Ivanov, A.I., (2000) Biometric Authentication Based on the Dynamics of Subconscious Movements, Penza, Russia: PGU Publishing House, 178 p., (in Russian).

  4. Ivanov, A.I., (2004) Neural Network Biometric Authentication Algorithms, Book 15, series ''Neurocomputers and their Applications'', Moscow, Russia: Radio Engineering, 144 p., (in Russian).

  5. Ivanov, A.I. and Malygina, E.A. (2015) Biometric authentication of identity: inversion of matrices of neural network functional in Hamming metric space, Information security issues, 1, pp. 23-29, (in Russian).

  6. Ivanov, A.I., (2016) Multidimensional Neural Network Processing of Biometric Data with Software Reproduction of Quantum Superposition Effects, Penza, Russia: Publishing house Penzensky Scientific Research Electrotechnical Institute, 133 p., (in Russian).

  7. Bryukhomitsky, Yu.A., Zverev, EM, and Kazarin, M.N., (2005) User authentication using keyboard handwriting based on interchangeable virtual keyboards, Journal Information Countering the threat of Terrorism, 4, pp. 141-146, (in Russian).

  8. Zayats, VM. and Ulytsky, O.O., (2000) Algorithms and software for human recognition system based on manual reactions, Visnyk Derzh. Universytetu Lvivs'ka Politekhnika. Computer Engineering and Information Technologies, 392, pp.73-76, (in Ukrainian).

  9. Zayats, V.M., (2006) Approach to describing the computer user authentication system, Computer Printing Technologies, pp. 46-53, (in Ukrainian).

  10. Zayats, VM, and Zayats, M.M., (2005) Mathematical description of computer user authentication system, Physical-Mathematical Modeling and Information Technologies, Lviv, 1, pp. 146-152, (in Ukrainian).

  11. Chalaya, L.E., (2004) User Authentication Model by Keyboard Handwriting, Artificial Intelligence, 4, pp. 811-817, (in Ukrainian).

  12. Chalaya, L.E., (2007) A method of forming a database of biometric standards for authenticating users of information systems by behavioral characteristics, Bionics of intelligence, 2(67), pp. 78-83, (in Ukrainian).

  13. LTvia, C.F., Ara'ujo Luiz, H.R., Sucupira, Miguel Gustavo Liz'arraga, Lee Luan Ling, and Jo'ao Baptista T. Yabuuti, (2004) User Authentication through Typing Biometrics Features, Lecture Notes in Computer Science, 3072, pp. 694-700.

  14. De Luca, A., Hang, A., Brudy, F., Lindner, Ch., and Hussmann, H., (2012), Touch Me Once and I Know it's You! Implicit Authentication Based on Touch Screen Patterns, CHI ACM, pp. 987-996.

  15. Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., and Smith, J.M., (2010) Smudge attacks on smartphone touch screens, USENIX 4th Workshop WOOT.

  16. Ball, R.M., Connel, J.H., Pankanti, S., Ratha, N.K., and Senor, E.W., (2007) Guide to Biometrics, Moscow, Russia: Tekhnosfera, 368 p., (in Russian).

  17. Rabiner, L., and Juang, B.H., (1993) Fundamentals of Speech Recognition, Prentice Hall PTR, 507 p.

  18. Eamonn, J. and Keogh, M.J., (2018) Pazzani. Derivative Dynamic Time Warping, International Journal of Research in Electronicals and Computer Engineering, 5, pp. 524-528.

  19. Senin, P., (2008) DTW Algorithm Review. Information and Computer Science Department, Honolulu, 23.

  20. Stan, S. and ChanFast, P., (2017) DTW: Toward Accurate Dynamic Time Warping in Linear Time and Space, International Journal of Science Technology Management and Research, 7, pp. 1-5.

  21. Ghazi Al-Naymat, and Sanjay Chawla, Javid Taheri, (2009) Sparse DTW: A novel approach to speed up, The 2009 Australasian Data Mining, 10, pp. 117-127.

  22. Niels, R., (2004) Dynamic Time Warping: An intuitive way of handwriting recognition? MASTER THESIS, 95 p.

  23. Lin, D.-T., (1997) Computer-access authentication with neural network based keystroke identity verification, International Conference Neural Networks, 1, pp. 174-178.

  24. Obaidat, M. and Sadoun, B., (1997) Verification of computer users using keystroke dynamics, In Systems, Man, and Cybernetics, Part B: Cybernetics, 27(2), pp. 261-269.

  25. Monrose, F. and Rubin, A.D., (1997) Authentication via keystroke dynamics, Proceedings of the 4th ACM Conference on Computer and Communications Security, New York, USA: ACM, 13, pp. 48-56.

  26. Obaidat, M. and Macchiarolo, D., (1993) An online neural network system for computer access security, Industrial Electronics, IEEE Transactions, 40(2), pp. 235-242.

  27. Zahid, S., Shahzad, M., Khayam, S.A., and Farooq, M., (2009) Keystrokebased user identification on smart phones, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, Berlin, 9, pp. 224-243.

  28. Shanmugapriya, D. and Padmavathi, G., (2009) The Third International Conference on Mobile Services, Resources, and Users dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, 5(1), pp. 189-196.

  29. Buchoux, A. and Clarke, N.L., (2008) Deployment of keystroke analysis on a smartphone, Proceedings of the 6th Australian Information Security & Management Conference. 6, pp. 40-47.

  30. Banerjee, S. and Woodard, D., (2012) Biometric authentication and identification using keystroke dynamics: A survey, Journal of Pattern Recognition Research, 7, pp. 116-139.

  31. Umphress., D. and Williams, G., (1985) Identity verification through keyboard characteristics, International Journal of Man-Machine Studies, 23, pp. 263-273.

  32. Joyce, R. and Gupta, G., (1990) Identity authentication based on keystroke latencies, Commun. ACM. New York, NY, USA, 33, pp. 168-176.

  33. Ord, T. and Furnell, S., (2000) User authentication for keypad-based devices using keystroke analysis, Proc. 2nd Int'l Network Conf (INC 2000), 2, pp. 263-272.

  34. Clarke, N.L. and Furnell, S.M., (2006) Authenticating mobile phone users using keystroke analysis, Int. J. Inf. Secur., Berlin, Heidelberg: Springer-Verlag, 6, pp. 1-14.

  35. Saevanee, H. and Bhattarakosol, P., (2009) Authenticating user using keystroke dynamics and finger pressure, Consumer Communications and Networking Conference 6th IEEE, 6, pp. 1-2.

  36. Trojahn, M. and Ortmeier, F., (2012) Biometric authentication through a virtual keyboard for smartphones, International Journal of Computer Science & Information Technology (IJCSIT), 8.

  37. pp. 1-12.

Articles with similar content:

Journal of Flow Visualization and Image Processing, Vol.1, 1993, issue 3
A. K. Lednev, N. G. Burago, V. I. Bojarintsev, V. A. Frost
Detection of Narrow-Band Signals with Noise Level Assessment
Telecommunications and Radio Engineering, Vol.67, 2008, issue 1
S. V. Bukharin, V. P. Litvinenko, A. N. Glushkov
Flexible Automation and Intelligent Manufacturing, 1997:
Proceedings of the Seventh International FAIM Conference, Vol.0, 1997, issue
Carlos Bremer, Fredy J. Valente, Paulo C. de Carvalho Dias, Edson dos S. Moreira
The Concept of Building the Information Model of an Enterprise
Telecommunications and Radio Engineering, Vol.64, 2005, issue 1-6
R. M. Mikita, A. S. Sviridov, Yu. I. Rogozov, L. N. Stukotii
Comparative Characteristics of Program Moduli of Computer Systems of Optimal Control for Certain Controlled Objects
Journal of Automation and Information Sciences, Vol.39, 2007, issue 7
Victor I. Musurivskiy