Affiliation:
1. Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, India
Abstract
Enhanced authentication is the need of the hour in today's technology. Commonly used login and password are not enough as they may be guessed by imposters. Most of the websites adopt the traditional authentication as login and password. But they don't verify whether the same person is accessing their information continuously in the current session. This is of great concern in distance-based e-learning systems. The institutes offering the e-courses must verify whether it is the same student who enrolled, is accessing their materials, doing the assignments themselves, and completing the examination without any cheating. In this case, one of the techniques, behavioral biometrics-keystroke dynamics, plays a very important role. Along with other authentication methods, keystroke dynamics can be combined to provide a more secured system for the students in e-learning environments. In this chapter, the basics of keystroke dynamics and some of the applications that use them are discussed.
Reference28 articles.
1. Identity verification through dynamic keystroke analysis
2. Enhanced recognition of keystroke dynamics using Gaussian mixture models
3. Doddington, G., Liggett, W., Martin, A., Przybocki, M. & Reynolds, D. (1998). Sheep, goats, lambs and wolves: A statistical analysis of speaker performance in the nist1998speaker recognition evaluation. ICSLP98.
4. Towards the security evaluation of biometric authentication systems;M.El-Abed;IEEE International Conference on Security and Technology (ICSST).,2011
5. Continuous Biometric User Authentication in Online Examinations