Increasing the Reliability of User Authentication Based on Protected Electronic Key and Behavioral Biometrics

Authors

  • O. V. Saliieva Vinnytsia National Technical University
  • I. S. Zoria Vinnytsia National Technical University
  • I. O. Bondarenko Vinnytsia National Technical University
  • M. O. Berestenko Vinnytsia National Technical University

DOI:

https://doi.org/10.31649/1997-9266-2023-167-2-102-111

Keywords:

information system, two-factor authentication, electronic key, entropy of mouse movements

Abstract

The rapid spread of software applications in all spheres of human activity necessitates the need to ensure the protection of the data contained in them. Therefore, currently, the issues related to the improvement of authentication methods to prevent unauthorized access to software resources are relevant. To solve these problems, it is important to consider that different types of systems have their own unique requirements for authentication subsystems. In addition, the active development of computer technology makes it possible to break authentication algorithms, which were considered reliable a few years ago. In this regard, the work proposes to improve the reliability of user authentication based on a protected electronic key using the AES algorithm and analysis of the entropy of mouse movements, which is an individual characteristic for each person. The implementation of the electronic key is due to its advantages, such as reduced costs, increasing the convenience of use, reducing the probability of loss or theft, and reducing the risk of attacks through an intermediary. Analyzing the entropy of mouse movements will enable to perform the user authentication based on biometric behavioral characteristics that are universal, unique and permanent. Describing the algorithm of the mouse entropy analysis process, it is worth noting that the feature of tracking dynamic behavioral characteristics is that the user moves the mouse cursor along a complex curve with a speed that changes during the movement. The shape of the curved line and the speed of the cursor movement are determined by a number of physiological and psychological factors, in particular, such as: the size and weight of the hand, the position of the hand and the whole body, the state of the nervous system, user habits, etc. To improve the user authentication algorithm in the protected application, an electronic key using the JSON Web Tokens technology, which allows you to avoid authentication errors, increase the performance and scalability of the application, has been developed. Testing of the developed application will be performed on the basis of unit tests and the study of FAR and FRR indices.

Author Biographies

O. V. Saliieva, Vinnytsia National Technical University

Dr. of Philosophy in Cyber Security (PhD), Senior lecturer of the Chair of Management and Security of Information Systems

I. S. Zoria, Vinnytsia National Technical University

Assistant of the Chair of Management and Security of Information Systems

I. O. Bondarenko, Vinnytsia National Technical University

Assistant of the Chair of Management and Security of Information Systems

M. O. Berestenko, Vinnytsia National Technical University

Student of the Department of Management and Information Security

References

Департамент спеціальних телекомунікаційних систем та захисту інформації Служби безпеки України, «Термінологія в галузі захисту інформації в комп’ютерних системах від несанкціонованого доступу,» НД ТЗІ 1.1-003-99, чинний від 01.07.1999.

В. В. Фесьоха, і Н. О. Фесьоха, «Модель нечіткої автентифікації користувачів інформаційних систем органів військового управління на основі поведінкової біометрії,» Захист інформації, т. 23, № 2, с. 116-123, 2021.

О. В. Горбенко, Ю. Л. Горбенко, А. Ю. Горбенко, і О. М. Сівоха, «Захист інформаційних систем за допомогою використання методів автентифікації,» Збірник наукових праць Центру воєнно-стратегічних досліджень НУОУ імені Івана Черняховського, с. 79-85, 2020.

О. Г. Корченко, А. М. Давиденко, і О. О. Висоцька, «Метод автентифікації користувачів інформаційних систем за їх рукописним почерком з багатокроковою корекцією первинних даних,» Захист інформації, т. 21, № 1, с. 40-51, 2019.

P. Jayapriya, R. R. Manimegalai, and R. Kumar Lakshmana, “A Survey on Different Techniques for Biometric Template Protection,” Journal of Internet Technology, vol. 21, no. 5, 2020.

A. Sarkar, and Binod K. Singh, “A Review on Different Biometric Template Protec-tion Methods,” Recent Advances in Computer Science and Communications, vol. 14, issue 5, pp. 1551-1572, 2021.

Google Authenticator. GooglePlay. [Electronic resource]. Available:

https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=uk&gl=US . Accessed: 15 March 2023.

Duo Mobile. GooglePlay. [Electronic resource]. Available:

https://play.google.com/store/apps/details?id=com.duosecurity.duomobile&hl=uk&gl=US. Accessed: 15 March 2023.

Microsoft Authenticator. GooglePlay. [Electronic resource]. Available:

https://play.google.com/store/apps/details?id=com.azure.authenticator&hl=uk&gl=US. Accessed: 15 March 2023.

Free OTP. GooglePlay. [Electronic resource]. Available:

https://play.google.com/store/apps/details?id=org.liberty.android.freeotpplus&hl=uk&gl=AZ. Accessed: 15 March 2023.

Authy. GooglePlay. [Electronic resource]. Available:

https://play.google.com/store/apps/details?id=com.authy.authy&hl=uk&gl=US. Accessed: 15 March 2023.

JSON Web Tokens. [Electronic resource]. Available: https://auth0.com/docs/secure/tokens/json-web-tokens. Accessed: 15 March 2023.

Douglas-Packer algorithm. Towardsdatascience. [Electronic resource]. Available:

https://towardsdatascience.com/simplify-polylines-with-the-douglas-peucker-algorithm-ac8ed487a4a1. Accessed: 20 March 2023.

Unit testing. Techtarget. [Electronic resource]. Available: https://www.techtarget.com/searchsoft warequality/definition/unit-testing#:~:text=Unit%20testing%20is%20a%20software,independently%20scrutinized%20for%20proper%20operation. Accessed: 20 March 2023.

FAR and FRR: security level versus user convenience. Recogtech. [Electronic resource]. Available: https://www.recogtech.com/en/knowledge-base/security-level-versus-user-convenience. Accessed: 20 March 2023.

Postman. Офіційний сайт Postman.com [Electronic resource]. Available: https://www.postman.com. Accessed: 20 March 2023.

Downloads

Abstract views: 66

Published

2023-05-04

How to Cite

[1]
O. V. . Saliieva, I. S. Zoria, I. O. Bondarenko, and M. O. Berestenko, “Increasing the Reliability of User Authentication Based on Protected Electronic Key and Behavioral Biometrics”, Вісник ВПІ, no. 2, pp. 102–111, May 2023.

Issue

Section

Information technologies and computer sciences

Metrics

Downloads

Download data is not yet available.