Manchester Metropolitan University's Research Repository

    Strengthen user authentication on mobile devices by using user’s touch dynamics pattern

    Teh, Pin Shen ORCID logoORCID: https://orcid.org/0000-0002-0607-2617, Zhang, Ning, Tan, Syh-Yuan, Shi, Qi, Khoh, Wee How and Nawaz, Raheel ORCID logoORCID: https://orcid.org/0000-0001-9588-0052 (2020) Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing, 11 (10). pp. 4019-4039. ISSN 1868-5137

    Published Version
    Available under License Creative Commons Attribution.

    Download (3MB) | Preview


    Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have investigated the use of touch dynamics biometrics as a mobile device authentication solution by designing, implementing and evaluating a touch dynamics authentication method. This paper describes the design, implementation, and evaluation of this method, the acquisition of raw touch dynamics data, the use of the raw data to obtain touch dynamics features, and the training of the features to build an authentication model for user identity verification. The evaluation results show that by integrating the touch dynamics authentication method into the PIN-based authentication method, the protection levels against impersonation attacks is greatly enhanced. For example, if a PIN is compromised, the success rate of an impersonation attempt is drastically reduced from 100% (if only a 4-digit PIN is used) to 9.9% (if both the PIN and the touch dynamics are used).

    Impact and Reach


    Activity Overview
    6 month trend
    6 month trend

    Additional statistics for this dataset are available via IRStats2.


    Actions (login required)

    View Item View Item