8 research outputs found

    An examination of keystroke dynamics for continuous user authentication

    Get PDF
    Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session

    User-representative feature selection for the keystroke dynamics

    Get PDF
    Continuous user authentication with keystroke dynamics uses characters sequences as features. Since users can type characters in any order, it is imperative to find character sequences (n-graphs) that are representative of user typing behavior. The contemporary feature selection approaches do not guarantee selecting frequently-typed features which may cause less accurate statistical user-representation. Furthermore, the selected features do not inherently reflect user typing behavior. We propose four statistical based feature selection techniques that mitigate limitations of existing approaches. The first technique selects the most frequently occurring features. The other three consider different user typing behaviors by selecting: n-graphs that are typed quickly; n-graphs that are typed with consistent time; and n-graphs that have large time variance among users. We use Gunetti’s keystroke dataset and k-means clustering algorithm for our experiments. The results show that among the proposed techniques, the most-frequent feature selection technique can effectively find user representative features. We further substantiate our results by comparing the most-frequent feature selection technique with three existing approaches (popular Italian words, common n-graphs, and least frequent ngraphs). We find that it performs better than the existing approaches after selecting a certain number of most-frequent n-graphs

    Continuous biometric authentication: Can it be more practical?

    Get PDF
    Continuous biometric authentication schemes (CBAS) are built around the biometrics supplied by user behavioural characteristics and continuously check the identity of the user throughout the session. The current literature for CBAS primarily focuses on the accuracy of the system in order to reduce false alarms. However, these attempts do not consider various issues that might affect practicality in real world applications and continuous authentication scenarios. One of the main issues is that the presented CBAS are based on several samples of training data either of both intruder and valid users or only the valid users' profile. This means that historical profiles for either the legitimate users or possible attackers should be available or collected before prediction time. However, in some cases it is impractical to gain the biometric data of the user in advance (before detection time). Another issue is the variability of the behaviour of the user between the registered profile obtained during enrollment, and the profile from the testing phase. The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications. Also, the paper discusses a new application for CBAS not requiring any training data either from intruders or from valid users

    Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm

    No full text
    International audienceIn vehicular ad hoc networks, the vehicle speed can exceed 120 kmph. Therefore, any node can enter or leave the network within a very short time. This mobility adversely affects the network connectivity and decreases the life time of all established links. To overcome these problems, many routing protocols based clustering technique have been proposed. Indeed, the poor assignment of vehicles to clusters is the most important shortcomings where an inaccurate affiliation may reduce the algorithm’s effectiveness and disrupt all results and analyzes. Therefore, in this paper, we used a hybrid genetic algorithm to improve the cluster maintenance phase in our Weighted K-medoid Clustering Algorithm (WKCA) proposed recently. The proposed model incorporated the tabu search within genetic algorithm to allow the scan of all search space and to reach the best solution without falling into the local optima. This model improves the assignment of nodes to clusters, which in turn achieves efficient vehicle communication and ensures more stability in clustered architecture. Based on relevant metrics, the results obtained in a simulation game show that the enhanced model (E-WKCA) achieves more stability and robustness when compared to the original algorithm (WKCA) and other approaches designed for the same objective

    A Blockchain-Enabled IoT Logistics System for Efficient Tracking and Management of High-Price Shipments: A Resilient, Scalable and Sustainable Approach to Smart Cities

    No full text
    The concept of a smart city is aimed at enhancing the quality of life for urban residents, and logistic services are a crucial component of this effort. Despite this, the logistics industry has encountered issues due to the exponential growth of logistics volumes, as well as the complexity of processes and lack of transparency. Consequently, it is necessary to develop an efficient management system that offers traceability and condition monitoring capabilities to ensure the safe and high-quality delivery of goods. Moreover, it is crucial to guarantee the accuracy and dependability of distribution data. In this context, this paper proposes a blockchain-enabled IoT logistics system for the efficient tracking and management of high-price shipments. A smart contract based on blockchain technology has been designed for automatic approval and payment, with the aim of distributing shipping information exclusively among legitimate logistics parties. To ensure authentication, a zero-knowledge proof is used to conceal the blockchain address. Moreover, an intelligent parcel (iParcel) containing piezoresistive sensors is developed to pack delivered goods during the shipping process for violation detection such as severe falls or theft. The iParcels are automatically tracked and traced, and if a violation occurs, the contract is cancelled, and payment is refunded. The transaction fee per party is reasonable, particularly for high-price products that guarantee successful shipment

    Formal Verification of Hardware Components in Critical Systems

    No full text
    Hardware components, such as memory and arithmetic units, are integral part of every computer-controlled system, for example, Unmanned Aerial Vehicles (UAVs). The fundamental requirement of these hardware components is that they must behave as desired; otherwise, the whole system built upon them may fail. To determine whether or not a component is behaving adequately, the desired behaviour of the component is often specified in the Boolean algebra. Boolean algebra is one of the most widely used mathematical tools to analyse hardware components represented at gate level using Boolean functions. To ensure reliable computer-controlled system design, simulation and testing methods are commonly used to detect faults; however, such methods do not ensure absence of faults. In critical systems’ design, such as UAVs, the simulation-based techniques are often augmented with mathematical tools and techniques to prove stronger properties, for example, absence of faults, in the early stages of the system design. In this paper, we define a lightweight mathematical framework in computer-based theorem prover Coq for describing and reasoning about Boolean algebra and hardware components (logic circuits) modelled as Boolean functions. To demonstrate the usefulness of the framework, we (1) define and prove the correctness of principle of duality mechanically using a computer tool and all basic theorems of Boolean algebra, (2) formally define the algebraic manipulation (step-by-step procedure of proving functional equivalence of functions) used in Boolean function simplification, and (3) verify functional correctness and reliability properties of two hardware components. The major advantage of using mechanical theorem provers is that the correctness of all definitions and proofs can be checked mechanically using the type checker and proof checker facilities of the proof assistant Coq
    corecore