A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices


  • Ramzi Saifan, Dr. Dept. Computer Engineering University of Jordan Amman, Jordan
  • Asma Salem
  • Dema Zaidan
  • Andraws Swidan




Authentication, security, keystroke dynamics, user authentication, biometric, typing


Nowadays most systems became computerized and use internet for remote access, including systems which have critical and sensitive data such as banks and governmental institutions. This led to the huge need for a reliable and efficient authentication system to secure data. User authentication is mostly done using passwords. But it is not a sufficient way to use just a password since it has many drawbacks, like guessing them, brute force attacks, key-loggers and social engineering. Additional authentication procedure is needed to enhance password security. Keystroke dynamics is one of the famous behavioral measurements that rely on utilizing the typing rhythm of each individual. It is used to strengthen password authentication in an efficient and cheap way since no hardware will be added. This paper presents a comprehensive survey on research in the last two decades on keystroke dynamics authentication. The objective is to discuss, summarize and provide insightful comparison about the well-known approaches used in keystroke dynamics such as statistical and neural network approaches, as well as offering suggestions and possible future research directions, especially for touch-screen and mobile devices. Keystroke dynamics could provide a second authentication factor for touch screen devices, as they are rapidly increasing in their use and are replacing the classical keyboards in the markets.


Download data is not yet available.


[1] Joyce, Rick, and Gopal Gupta. "Identity authentication based on keystroke latencies." Communications of the ACM 33.2 (1990): 168-176.‏

[2] Monrose, Fabian, and Aviel D. Rubin. "Keystroke dynamics as a biometric for authentication." Future Generation computer systems 16.4 (2000): 351-359.‏

[3] Jiang, Cheng-Huang, Shiuhpyng Shieh, and Jen-Chien Liu. "Keystroke statistical learning model for web authentication." Proceedings of the 2nd ACM symposium on Information, computer and communications security. ACM, 2007.‏

[4] Karnan, M., M. Akila, and N. Krishnaraj. "Biometric personal authentication using keystroke dynamics: A review." Applied Soft Computing 11.2 (2011): 1565-1573.‏

[5] Shanmugapriya, D., and Ganapathi Padmavathi. "A survey of biometric keystroke dynamics: Approaches, security and challenges." arXiv preprint arXiv: 0910.0817 (2009).‏

[6] Peacock, Alen, Xian Ke, and Matthew Wilkerson. "Typing patterns: A key to user identification." IEEE Security & Privacy 2.5 (2004): 40-47.‏

[7] Mudhafar, M. "Al-Jarrah, an Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity." Journal of Emerging Trends in Computing and Information Sciences VOL3 6 (2012).‏

[8] Bajaj, Swarna, and Sumeet Kaur. "Typing Speed Analysis of Human for Password Protection (Based On Keystrokes Dynamics)." no 2 (2013): 88-91.‏

[9] Schlenker, Anna, and Milan Sarek. "Behavioural Biometrics for Multi-Factor Authentication in Biomedicine." EJBI 8.5 (2012): 19-24.‏

[10] Tey, Chee Meng, Payas Gupta, and Debin Gao. "I can be you: Questioning the use of keystroke dynamics as biometrics." The 20th Annual Network & Distributed System Security Symposium (NDSS 2013), 2013.‏

[11] Gascon, Hugo, et al. "Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior." Sicherheit. 2014.‏

[12] Alves, D. D., G. Cruz, and C. Vinhal. "Authentication system using behavioral biometrics through keystroke dynamics." Computational Intelligence in Biometrics and Identity Management (CIBIM), 2014 IEEE Symposium on. IEEE, 2014.‏

[13] Bhatt, Shanthi, and T. Santhanam. "Keystroke dynamics for biometric authentication—A survey." Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on. IEEE, 2013.‏

[14] Chandrasekar, V., V. Shanmugavalli, and P. Krishna Sankar. "Multimodel Biometric Authentication Based on Finger Print and Keystroke Dynamics Using Fuzzy Set." Australian Journal of Basic & Applied Sciences 8.7 (2014).‏

[15] Trojahn, Matthias, and Frank Ortmeier. "Biometric authentication through a virtual keyboard for smartphones." International Journal of Computer Science & Information Technology (IJCSIT) 4.5 (2012).‏

[16] Abernethy, Mark, and Shri Rai. "Applying Feature Selection to Reduce Variability in Keystroke Dynamics Data for Authentication Systems." (2012).‏

[17] Tasia, Cheng‐Jung, et al. "Two novel biometric features in keystroke dynamics authentication systems for touch screen devices." Security and Communication Networks 7.4 (2014): 750-758.‏

[18] Dhage, Sudhir, et al. "Mobile authentication using keystroke dynamics." Communication, Information & Computing Technology (ICCICT), 2015 International Conference on. IEEE, 2015.‏

[19] Roy, Soumen, Utpal Roy, and D. D. Sinha. "Enhanced knowledge-based user authentication technique via keystroke dynamics." Int. J. Eng. Sci. Invention (IJESI) 3.9 (2014): 41-48.‏

[20] Zhong, Yu, Yunbin Deng, and Anil K. Jain. "Keystroke dynamics for user authentication." Computer Vision and Pattern Recognition Workshops (CVPRW), 2012 IEEE Computer Society Conference on. IEEE, 2012.‏

[21] Babaeizadeh, Mahnoush, Majid Bakhtiari, and Mohd Aizaini Maarof. "Authentication Method through Keystrokes Measurement of Mobile users in Cloud Environment." Int. J. Advance Soft Compu. Appl 6.3 (2014).‏

[22] M. Obaidat and D. Macchiarolo. “An online neural network system for computer access security”. IEEE Transactions on Industrial Electronics, 40(2):235 –242, Apr. 1993.

[23] Raza, Mudassar, et al. "A survey of password attacks and comparative analysis on methods for secure authentication." World Applied Sciences Journal 19.4 (2012): 439-444.‏

[24] Halakou, F. Feature Selection in Keystroke Dynamics Authentication Systems.

[25] Banerjee, Salil P., and Damon L. Woodard. "Biometric authentication and identification using keystroke dynamics: A survey." Journal of Pattern Recognition Research 7.1 (2012): 116-139.‏

[26] Maren, A. J., Harston, C. T., & Pap, R. M. (2014). Handbook of neural computing applications. Academic Press.

[27] Li, C. T., Weng, C. Y., & Fan, C. I. (2012). Two-factor user authentication in multi-server networks. International Journal of Security and Its Applications, 6(2), 261-267.




How to Cite

Saifan, R., Salem, A., Zaidan, D., & Swidan, A. (2016). A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices. Journal of Social Sciences (COES&Amp;RJ-JSS), 5(1), 29–41. https://doi.org/10.25255/jss.2016.