This is an open access article published by the IET under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0/)
A novel method of cross-device tracking based on user typing behaviours is presented. Compared with existing methods, typing behaviours can offer greater security and efficiency. When people type on their devices, a number of different factors may be considered to identify users, such as the angle and distance of contact point to the centre of the target character, the time elapsed between two typing actions and the physical force exerted on the device (which can be measured by an accelerometer). An experiment was conducted to validate the proposed model; those data are collected through an Android App developed for the purpose of this study. By collecting a reasonable amount of this type of data, it is shown that machine learning algorithms can be employed to first classify different users and subsequently authenticate users across devices.
References
-
-
1)
-
5. Nikiforakis, N., Kapravelos, A., Joosen, W., et al: ‘Cookieless monster: exploring the ecosystem of web-based device fingerprinting’. The 2013 IEEE Symp. on Security and Privacy (SP), Berkeley, CA, USA, June 2013, pp. 541–555.
-
2)
-
4. Neufeld, E.: ‘Cross-device and cross-channel identity measurement issues and guidelines’, J. Advert. Res., 2017, 57, (1), pp. 109–117 (doi: 10.2501/JAR-2017-008).
-
3)
-
3. Zimmeck, S., Li, J.S., Kim, H., et al: ‘A privacy analysis of cross-device tracking’. 26th {USENIX} Security Symp., Vancouver, BC, Canada, August 2017, pp. 1391–1408.
-
4)
-
2. Brookman, J., Rouge, P., Alva, A., et al: ‘Cross-device tracking: measurement and disclosures’, Proc. Priv. Enhanc. Technol., 2017, 2017, (2), pp. 133–148.
-
5)
-
6. Englehardt, S., Reisman, D., Eubank, C., et al: ‘Cookies that give you away: the surveillance implications of web tracking’. The 24th Int. Conf. on World Wide Web, Florence, Italy, May 2015, pp. 289–299.
-
6)
-
7. Bauer, E., Kohavi, R.: ‘An empirical comparison of voting classification algorithms: bagging, boosting, and variants’, Mach. Learn., 1999, 36, (1), pp. 105–139 (doi: 10.1023/A:1007515423169).
-
7)
-
1. Asplund, M., Nadjm-Tehrani, S.: ‘Attitudes and perceptions of iot security in critical societal services’, Access, 2016, 4, pp. 2130–2138 (doi: 10.1109/ACCESS.2016.2560919).
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2018.0893
Related content
content/journals/10.1049/el.2018.0893
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Correspondence
This article has following corresponding article(s):
in brief