A Model to Secure Mobile Devices using Keystroke Dynamics through Soft Computing Techniques
M. Karnan1, N. Krishnaraj2
1Dr.M.Karnan, Department of Computer Science and Engineering, Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India.
2N.Krishnaraj, Research Scholar, Manonmaniam Sundaranar University, Tirunelveli,Tamilnadu , India.
Manuscript received on July 01, 2012. | Revised Manuscript received on July 04, 2012. | Manuscript published on July 05, 2012. | PP: 71-75 | Volume-2, Issue-3, July 2012. | Retrieval Number: C0693052312/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this mobile world, there are more mobile phones in than computers. Everyday more of these phones becomes smart phones. Nowadays, mobile devices functions like a mini computer, it becomes more attractive target for thieves. A reliable security application is needed to safeguard data and protect against theft. As mobile devices become more pervasive in our lives, there is a greater need to protect the data on such devices. The current PIN (Personal Identification Number) authentication in mobile device is weak and there is a demand of strong authentication. Biometrics adds an additional authentication and it provides most significant improvement in mobile security. In this research work, we proposed a hybrid authentication mechanism (keystroke, finger print and palm print) where biometric data’s are captured and user template can be generated. The template is used to check whether the user is authenticated person or an imposter
Keywords: PIN, Template, Keystroke dynamics, Finger print, palm print