Next Article in Journal
Language Accent Detection with CNN Using Sparse Data from a Crowd-Sourced Speech Archive
Next Article in Special Issue
Light Spectrum Optimizer: A Novel Physics-Inspired Metaheuristic Optimization Algorithm
Previous Article in Journal
Circumventing Ill-Conditioning Arising from Using Linear Multistep Methods in Approximating the Solution of Initial Value Problems
Previous Article in Special Issue
A Multi-Start Biased-Randomized Algorithm for the Capacitated Dispersion Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

by
El-Sayed M. El-Kenawy
1,*,
Seyedali Mirjalili
2,3,*,
Abdelaziz A. Abdelhamid
4,*,
Abdelhameed Ibrahim
5,
Nima Khodadadi
6 and
Marwa M. Eid
7
1
Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt
2
Centre for Artificial Intelligence Research and Optimization, Torrens University Australia, Fortitude Valley, QLD 4006, Australia
3
Yonsei Frontier Lab, Yonsei University, Seoul 03722, Korea
4
Department of Computer Science, Faculty of Computer and Information Sciences, Ain Shams University, Cairo 11566, Egypt
5
Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt
6
Department of Civil and Environmental Engineering, Florida International University, Miami, FL 33199, USA
7
Faculty of Artificial Intelligence, Delta University for Science and Technology, Mansoura 11152, Egypt
*
Authors to whom correspondence should be addressed.
Mathematics 2022, 10(16), 2912; https://doi.org/10.3390/math10162912
Submission received: 15 July 2022 / Revised: 30 July 2022 / Accepted: 10 August 2022 / Published: 13 August 2022
(This article belongs to the Special Issue Metaheuristic Algorithms)

Abstract

:
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used smartphone authentication mechanisms. Because PINs have just four or six characters, they are subject to shoulder-surfing attacks and are not as secure as other authentication techniques. Biometric authentication methods, such as fingerprint, face, or iris, are now being studied in a variety of ways. The security of such biometric authentication is based on PIN-based authentication as a backup when the maximum defined number of authentication failures is surpassed during the authentication process. Keystroke-dynamics-based authentication has been studied to circumvent this limitation, in which users were categorized by evaluating their typing patterns as they input their PIN. A broad variety of approaches have been proposed to improve the capacity of PIN entry systems to discriminate between normal and abnormal users based on a user’s typing pattern. To improve the accuracy of user discrimination using keystroke dynamics, we propose a novel approach for improving the parameters of a Bidirectional Recurrent Neural Network (BRNN) used in classifying users’ keystrokes. The proposed approach is based on a significant modification to the Dipper Throated Optimization (DTO) algorithm by employing three search leaders to improve the exploration process of the optimization algorithm. To assess the effectiveness of the proposed approach, two datasets containing keystroke dynamics were included in the conducted experiments. In addition, we propose a feature selection algorithm for selecting the proper features that enable better user classification. The proposed algorithms are compared to other optimization methods in the literature, and the results showed the superiority of the proposed algorithms. Moreover, a statistical analysis is performed to measure the stability and significance of the proposed methods, and the results confirmed the expected findings. The best classification accuracy achieved by the proposed optimized BRNN is 99.02% and 99.32% for the two datasets.

1. Introduction

Devices of the Internet-of-Things (IoT), such as smartphones, are expected to play a significant role in the future of intelligent cities as crowd-sensing entities [1]. Increased smartphone usage necessitates greater security and privacy protection measures. Personal Identification Numbers (PIN) and unlock patterns are popular authentication techniques for cellphones because of their high level of security. However, PINs have just four or six characters. Therefore, they are subject to shoulder-surfing attacks and are not as secure as other authentication techniques. Several biometric recognition approaches have been developed to overcome this constraint and authenticate a typical users using their unique biometric information. It is possible for a smartphone to learn unique information about its user, such as the user’s face [2], fingerprint [3], or iris [4] data; PIN-based authentication, on the other hand, is required as the final step in the authentication process if the user cannot correctly enter their biometric recognition information or reaches the maximum number of attempts previously defined. If an intruder obtains knowledge of a user’s Personal Identification Number (PIN), the smartphone will grant the intruder access during the PIN-entry phase.
When a person types in their PIN, their typing patterns are analyzed and used to classify them according to the keystroke-dynamics-based authentication system. Researchers have been successful in preventing such breaches of security. In addition, several studies have been conducted to improve the classification performance of these methods. These studies have focused on diversifying the features extracted from typing patterns, employing artificial rhythms to facilitate user classification, or utilizing an appropriate classifier for binary classification. Over the past few decades, multiple optimization approaches have been gradually developed for handling challenging optimization problem in different fields. The optimization algorithms are based on various inspirations from different aspects such as nature [5], art [6], and physics [7], which are applied for different fields of study [8,9,10]. In addition, meta-heuristic algorithms are used for the parameter optimization of some methods.
In contrast to currently used methodologies, the method proposed in this paper was aimed to increase the classification performance of the regular user by utilizing the meta-heuristic optimization applied to the Bidirectional Recurrent Neural Network (BDRNN). The parameters of BDRNN are optimized using a new optimization algorithm based on the Dipper Throated Optimization (DTO) with dynamic weights assigned to three search leaders instead of one to improve the optimization results. Following feature selection and preprocessing, the data obtained from two keystroke dynamics datasets were employed for assessing the proposed algorithm. The achieved results were then compared to those of the other optimization and machine learning techniques to prove the superiority of the proposed approach. The findings showed that the proposed method improved user categorization in analytical and practical aspects.
The remainder of this paper is organized as follows. Section 2 presents the literature review of the previous studies on user authentication using keystroke dynamics. Then, Section 3 discusses the keystroke dynamics used to collect and extract feature data in order to increase classification accuracy. The proposed optimization methodology is discussed in detail in Section 4, which focuses on the proposed algorithm and its guiding concepts. The conducted experiments and the achieved results are detailed in Section 5, where they are also contrasted and examined in terms of performance. The conclusions and future research areas are presented in Section 6.

2. Literature Review

The previous studies on user authentication and categorization using keystroke dynamics are covered in this section.
Users are progressively storing sensitive information (such as passwords of bank accounts, text messages, and PIN codes) on smartphones as they grow more integrated into our everyday lives. Research on the PIN entry method using random keypads rather than the current conventional keypads has been carried out to safeguard and protect such sensitive information from various dangers. A random keypad in a mobile setting was used to test the time it required to finish four and eight digit numbers in a research work from 2010 [11]. This system’s accuracy was compared to that of a standard keypad by counting how many keystrokes were correctly made. When entering four-digit numbers, the random keypad took nearly a second longer to complete each input, yet the mistake rate was just 0.01% higher, indicating a better performance. There was a 0.03% increase in the mistake rate while typing eight-digit figures, which took an additional 3 seconds to complete each input.
A common form of behavioral biometrics is “keystroke-dynamics-based authentication”, and it works by recognizing users based on the patterns and rhythms of their typing. This information is obtained while the users are typing on computer keyboards or the touchscreens of their smartphones. Since 1975, the practice of authenticating a person using keystroke dynamics has been in use [12], when this notion was initially introduced as an approach to identifying a user based on their typing habits. Classes with a False Rejection Rate (FRR) and a False Acceptance Rate (FAR) of 12% and 6%, respectively, were achievable in classification tests using this keystroke-based approach in 1985 [13]. Measured and retrieved from keyboard inputs, the amount of time between each keystroke was measured and used as a factor in the authentication process.
Keystroke-data-based user categorization performance can be improved by increasing the number of training datasets and normalizing the data gathered [14]. After having each of the thirty people who participated in the test enter 10 characters 20 times, the resulting data were normalized using user-dependent and user-independent methods. To complete each classification test successfully, it was essential to use varying amounts of practice data (5 to 10 data points out of the 20 collected data for each subject). The best results were obtained when the number of training data sets for each individual was set to 10, with an Equal Error Rate (EER) of 14.46%. When it comes to user authentication apps, this keystroke dynamics notion has been applied both on a PC and mobile device. Mobile phone numbers and four-digit PINs were classified using keystroke dynamics in a smartphone authentication investigation conducted in 2002 [15]. It was used as a data feature to determine the average amount of time required to input all of the specified keys and the standard deviation of the amount of time and the amount of delay time that occurred between each keystroke, achieving an EER of 15% for the 4-digit PINs.
In a study conducted in 2018, researchers attempted to identify people based on data collected by a smartphone’s motion sensor [16]. It was found that the motion data had a significant impact on the outcomes. Three different types of motion sensors were included in this design, namely, acceleration sensors, angular velocity sensors, and rotation-vector sensors. Calculations were performed based on the data collected by each sensor in order to determine the averages, standard deviations, sums of positive and negative integers, and the root mean square. This approach achieved an EER of 8.94% using user categorization findings without motion sensor information. The mean feature, which is based on motion sensors, decreased that amount by 1.05% to 7.89%. The motion sensor-based features performed best with the mean feature. These findings showed that using motion sensor feature data to enhance user categorization performance was achievable.
It has recently been used in various contexts in several studies. Keystroke dynamics studies from free text, as opposed to those that use fixed-length elements such as passwords or PINs, are among them [17,18]. Others include studies that continuously classify a user’s keystroke dynamics [18,19,20] and studies that take into account different types of typing postures such as relaxing positions, walking, and sitting [21]. There has been a lot of interest in biometric-based user authentication in addition to keystroke dynamics-based authentication. Recent attention has been paid to authentication methods based on electroencephalogram information as part of the attempt to address the limitations of existing biometric authentication systems, such as biometric information forgery [22] and Electrocardiogram (ECG) [23] information.
Keypad side-channel keystroke inference attacks may be mitigated using several techniques, such as [24]. The keypad buttons might be rearranged and increased in size, for example. The following are some effective defenses against side-channel keystroke inference attacks that were proposed in the study: Individual Key Randomization (IKR), Column Randomization (CR), Row Randomization (RR), and gray-scale IKR are all examples of keypad button randomization.
As part of an experiment conducted in 2019, test respondents were asked to type fixed PINs into a random keypad that was supposed to vary every round [25]. Based on the acquired data, the performance of user categorization was evaluated and examined. A random keypad was used to generate 10 rounds of PINs for the 30 participants. As a result of the inputted information, a random forest classifier was used to gather 32 different features (such as the amount of time it takes to press and release a single button), which were then used to create a classification model. The EER was found to be 10% as a result. However, the previous research [11,25], in contrast to our study, which provides a keypad that gathers unique qualities that reflect just regular humans, random keypad approaches could not easily acquire data on special features to categorize normal users efficiently. As an extra precaution against malicious keystroke inference attacks, one research [24] looked at the effectiveness of randomized keypads. Their goal is to determine whether or not the usage of distinct keypads helps to distinguish normal users from aberrant ones in a more accurate fashion.
Keystroke data may be used to identify typical and problematic smartphone users, according to the current research. An experiment in which participants were requested to type the four-letter key “abcd” in order to collect time vector data in the form of duration and interval time took place in [26]. Finally, feature selection strategies were explored based on the results of a genetic algorithm. Particle Swarm Optimization (PSO) was used to gather time vector data from 24 participants in a 2007 research as they input the four-digit key “abcd” [27]. Methods for selecting the best features for categorization were investigated. Twenty-two test individuals had passwords that were distinct from one another in [28]. Mean and standard deviations were calculated for each of the features derived from the gathered data: digraph, latency, and duration. They sought to employ Ant Colony Optimization (ACO) to enhance user categorization performance based on the measured data. To test and compare classification performance based on data obtained from 27 participants in [29], a variety of feature selection approaches were used, including PSO, ACO, Genetic Algorithm (GA), and Gravitational Search Algorithm (GSA). It was found that the accuracy ranged from 88.9% to 92.8%, with an EER of 0.063%, to 0.078%, and to 0.059%. In [30], Several methods were tried to categorize users, including the most often typed n-graph selection, the fastest typed n-graph selection, the time stability typed n-graph sample, and the time variation typed n-graph model. The most typically written n-graph selection strategy produced the best user classification results. In a 2020 study, feature scores were computed and evaluated using the data’s trimmed mean and variance coefficients. Low-scoring elements were eliminated to improve classification accuracy [31,32,33]. A summary of the relevant studies in the literature addressing the task of smartphone user authentication is presented in Table 1.

3. Keystroke Dynamics

“Keystroke dynamics” refers to the typing patterns or action types that emerge when a user hits the keys on a computer or smartphone. Keystroke dynamics-based authentication is a method of classifying people based on their typing patterns. During the authentication phase, data can be acquired from the user’s repetitive presses and releases of the smartphone screen. The time it takes to press and release each key, as well as the movement of the smartphone while the keys are pressed, are all examples of valuable data. Using the keystroke data acquired, it is possible to establish keystroke-dynamics-based authentication. Touch data and motion data may be used to separate keystroke data, which can then be analyzed based on various parameters.

3.1. Touch Information

Touch data are frequently collected when users touch the smartphone screen (keyDown) and remove their fingers from the screen (keyUp). We need to know how long it takes between touches on the smartphone screen, how much pressure the finger applies, and where the finger is positioned on the screen when the smartphone key is pressed and released to collect this data.

3.1.1. Dwell Time

The Dwell Time (DT) is a measure of how long it takes for a user to enter a single key, as shown in Figure 1. According to Equation (1), the  D T may be deduced from the recorded keyDown and keyUp data:
N . R e l e a s e N . P r e s s = D T n

3.1.2. Flight Time

When two keys are pressed, the Flight Time (FT) is calculated using the keyDown and keyUp data. Equation (2) is used to calculate the FT for each feature, whereas Equation (1) presents four FT features.
F l i g h t T i m e = N . R e l e a s e Y . P r e s s

3.1.3. Pressure

Pressure data are captured when a user presses down on the screen and then lifts their finger off of it. A user’s down pressure data correspond to their finger contacting the screen, while their up pressure data correspond to removing their finger from the screen.

3.1.4. Coordinates

A coordinate data recorder is activated every time a user pushes on an area of the screen and then takes their finger off it. It is upX and upY features that are gathered when a user removes their finger from the screen; downX and downY are collected when a user pushes the screen.

3.1.5. Motion Data

The smartphone is tracked while the user presses the keys on the screen to gather motion data. The x-, y-, and z-axis coordinates are used to measure the motion data. On the x-axis, the smartphone moves to the left and right, while on the y- and z-axes, the smartphone moves to the left or right, as illustrated in Figure 2. An acceleration, angular velocity and rotation vector are the three main categories of motion data that may be found in the data.

3.1.6. Accelerometer

Gravitational acceleration is most commonly detected via acceleration sensors, which may be used to estimate an object’s tilt or vibration level. With this property, the acceleration is quantified. While not in use, a smartphone is still subjected to gravity’s effects, which must be considered while extracting linear acceleration. The Accelerometer (acc) is used to denote acceleration, whereas Linear Acceleration (lacc) is denoted by the Linear Accelerometer (la).

3.1.7. Angular Velocity

Angles per hour around a certain axis can be measured by using the angular velocity sensor. The angular velocity may be determined using this feature. Gyroscope is the unit of measure used to describe the rate of change in the angular velocity.

3.1.8. Rotation Vector

The smartphone’s rotational axes are depicted graphically by the rotation vectors. A geomagnetic sensor is used to determine the orientation of the smartphone. The north pole influences the rotation vectors detected by a geomagnetic sensor. Rotation vectors are computed instead of utilizing geomagnetic sensor measurements to remove the effect of the north pole. Just like in determining acceleration and angular velocity, the accelerometer and gyroscope data are employed. The letter rot denotes the rotation vectors, but the word game rotation represents the vectors for game rotation.

4. The Proposed Methodology

The proposed methodology is based on optimizing the parameters of Bidirectional Recurrent Neural Network (BRNN) using a modified Dipper Throated Optimization (DTO) algorithm. This section starts with presenting the basics of BRNN and DTO followed by presenting the proposed algorithm.

4.1. Bidirectional Recurrent Neural Network (BRNN)

There are two parts to the concept of a Bidirectional Recurrent Neural Network. One part is responsible for forward states (forward neurons), and the other for backward states (backward states). Forward states’ outputs are not coupled to backward states’ inputs; the reverse is also true. According to Figure 3, this leads to the broad structure depicted in three time steps. This structure may be reduced to a typical unidirectional forward RNN without the backward states. They are reversing the time axis results in a regular RNN when forward states are removed. In contrast to the regular unidirectional RNN discussed above, the objective function can be directly minimized using input data from the past and future of the currently evaluated time frame without the need for delays to include future information because the same network handles both time directions citeBDRNN1, BDRNN2, BDRNN3. Figure 3 displays the typical structure of a BDRNN at three time steps, t 1 , t, and  t + 1 , for clarity. In the bottom section, information flows from left to right to represent the past, while in the top part, information flows from right to left to represent the future. O t is based on both the future and the past output symbolized by h t b and h t f , respectively, at the process of the computation. In order to train BRNN, a specified time period’s input information is used.
BDRNN can be trained using the same techniques as the traditional RNN because the two types of neurons in the BRNN architecture do not interact. BRNN’s feed-forward structure is unfolded as a result of this process. A more complicated process is required when using back-propagation since the state and output changes cannot be performed one at a time. A Multi-Layer Perceptron (MLP) network may be updated in a similar way to the Back-Propagation Through Time (BPTT) networks. For the forward t = 1 and backward t = T states, the values of the inputs are set to 0.5 . The values of the forward and backward local state derivatives at t = T and t = 1 states, on the other hand, are set to zero since it is assumed that information beyond this point is not important for the update carried out at the present state.

4.2. Dipper Throated Optimization (DTO)

It is assumed that a flock of birds is swimming in search of food through the DTO algorithm. Each of the following matrices can be used to represent the birds’ locations (represented by a matrix denoted by P) and velocities (represented by a matrix denoted by V) [35,36,37]. DTO can search for the best solution in the given search space based on these measures. The detailed steps of the traditional DTO algorithm are presented in Algorithm 1. The following matrices give more insight into the calculations of the DTO algorithm.
Algorithm 1 The Dipper Throated Optimization algorithm
1:
Input population, size, fitness function
2:
Output best agent position
3:
Initialize positions P i ( i = 1 , 2 , , n ) , velocities V i ( i = 1 , 2 , , n ) , and fitness function h.
4:
Initialize iterations M t , r 1 , r 2 , K 1 , K 2 , K 3 , K 4 , K 5 , R , t = 1
5:
Geth for each agent P i
6:
Find best solution P b e s t
7:
while t M t  do
8:
   for  ( i = 1 : i < n + 1 )  do
9:
       if  R < 0.5  then
10:
        Update agent position
11:
     else
12:
        Update agent velocity
13:
        Update agent position
14:
     end if
15:
   end for
16:
   Get h for each agent P i
17:
   Update  K 1 , K 2 , R
18:
   Set  P G b e s t = P b e s t
19:
end while
20:
Return  P G b e s t
P = P 1 , 1 P 1 , 2 P 1 , 3 P 1 , d P 2 , 1 P 2 , 2 P 2 , 3 P 2 , d P 3 , 1 P 3 , 2 P 3 , 3 P 3 , d P m , 1 P m , 2 P m , 3 P m , d
V = V 1 , 1 V 1 , 2 V 1 , 3 V 1 , d V 2 , 1 V 2 , 2 V 2 , 3 V 2 , d V 3 , 1 V 3 , 2 V 3 , 3 V 3 , d V m , 1 V m , 2 V m , 3 V m , d
where the ith bird in the jth dimension is denoted by P ( i , j ) for i 1 , 2 , 3 , , m and j 1 , 2 , 3 , , d . The bird’s speed in the jth dimension for i 1 , 2 , 3 , , m and j 1 , 2 , 3 , , d is referred to as V ( i , j ) . There is a uniform distribution of the initial positions of P ( i , j ) . For each bird, the values of the fitness functions f = f 1 , f 2 , f 3 , , f n are determined using the array below:
f = f 1 ( P 1 , 1 , P 1 , 2 , P 1 , 3 , , P 1 , d ) f 2 ( P 2 , 1 , P 2 , 2 , P 2 , 3 , , P 2 , d ) f 3 ( P 3 , 1 , P 3 , 2 , P 3 , 3 , , P 3 , d ) . . . f m ( P m , 1 , P m , 2 , P m , 3 , , P m , d )
where each bird’s quest for food is reflected in its fitness score, and the mother bird is the superior value. Sorting is performed by ascending the values. P b e s t has been proclaimed the first-best solution. Normal birds P n d are meant to be used as follower birds. P G b e s t has been named the world’s best solution. The optimizer’s first DTO technique for updating the swimming bird’s position is based on the following equations that update the position and speed of the individuals in the population:
X = P b e s t ( i ) K 1 . | K 2 . P b e s t ( i ) P ( i ) |
Y = P ( i ) + V ( i + 1 )
P ( i + 1 ) = X if R < 0.5 Y o t h e r w i s e ,
V ( i + 1 ) = K 3 V ( i ) + K 4 r 1 ( P b e s t ( i ) P ( i ) ) + K 5 r 2 ( P G b e s t P ( i ) )
where i is the iteration number in which P ( i ) is the average bird position,  P b e s t ( i ) is the position of the best bird, and  V ( i + 1 ) is the bird’s speed at iteration i + 1 K 1 , K 2 , and  K 3 are weight values, and K 4 and  K 5 are constants.  r 1 , r 2 , and R are random values in the range [ 0 , 1 ] .

4.3. The Proposed Dynamic Weighted DTO Algorithm

The proposed modified DTO optimization algorithm is based on Dynamic Weighted DTO and is referred to as (DWDTO) algorithm. The proposed algorithm divides the population into two groups: the exploration group and the exploitation group. In the traditional DTO, the exploration group is based on only one leader solution that explores the search space for finding the best solution. In the proposed algorithm, the leader solution works in collaboration with three other solutions to improve the exploration group’s performance and reach the best solution faster. The detailed steps of the proposed algorithm are listed in Algorithm 2, and the coming sections discuss the main parts of the proposed algorithm.
Algorithm 2 The Proposed DWDTO Algorithm
1:
Input population X i , ( i = 1 , 2 , , n ) , size n, and objective function F n
2:
Output best agent position
3:
Initialize DWDTO configuration parameters
4:
Function Fitness_Func (Solution P)
5:
   Calculate and return fitness of P
6:
End Function
7:
Sett = 1
8:
whilet < iter_Num do
9:
     Calculate objective function F n for each agent X i
10:
   Set N = best agent position
11:
   Randomize  g 1 , g 2 , g 3
12:
   Update  f ( t + 1 ) using Equation (10).
13:
   Decrease h exponentially from 1 to 0
14:
   In each group: Update the number of solutions
15:
   if the best fitness from the previous 4 iterations did not improve then
16:
     Increase in the exploration group solutions number
17:
   end if
18:
   for each solution in the exploration group do
19:
     update  f g 1 , f g 2 , f g 3 and N
20:
     The best solutions were elitism
21:
     if N < any of the best solutions then
22:
        Mutate the solution by
23:
        f(t+1) = k + ( ( f g 1 ) + ( z f g o 2 ) + ( k f g 3 ) ) 2 k
24:
         k = 1 z t 2 i t e r s _ c o u n t 2
25:
        k decreases exponentially from 2 to 0 over the course of iterations,
26:
     else
27:
        Search around current solution
28:
       P ( i + 1 ) = P b e s t ( i ) K 1 . | K 2 . P b e s t ( i ) P ( i ) | if R < 0.5 P ( i ) + V ( i + 1 ) o t h e r w i s e
29:
     end if
30:
   end for
31:
   for each solution in the exploitation group do
32:
     The best solutions were elitism
33:
     update  f g 1 , f g 2 , f g 3 and N
34:
     if N < any of the best solutions then
35:
        Move towards the best solution
36:
         f ( t + 1 ) = ( g 1 f o 1 ( t ) + z g 2 ( f g 2 ( t ) f g 3 ( t ) ) ) + ( 1 h ) g 3 ( l e a d e r ( t ) x r 1 ( t ) )
37:
     else
38:
        Search around the best solution
39:
         V ( i + 1 ) = K 3 V ( i ) + K 4 r 1 ( P b e s t ( i ) P ( i ) ) + K 5 r 2 ( P G b e s t P ( i ) )
40:
     end if
41:
   end for
42:
   Update fitness
43:
   Update solutions
44:
end while
45:
Return best agent position N

4.3.1. Exploration Group

This group is responsible for the exploration task for finding a promising point in the search space. In addition, it is responsible for avoiding becoming stuck in local optima, and to achieve that, the DWDTO uses two strategies. This step is applied to guarantee the population’s diversity, allowing the DWDTO to search in different search spaces. In this step, three random solutions are generated and guided by the leading solution to provide a better exploration of the search space. In this case, the objective function is measured using the following equations:
f ( t + 1 ) = ( g 1 f o 1 ( t ) + z g 2 ( f o 2 ( t ) f o 3 ( t ) ) ) + ( 1 h ) g 3 ( l e a d e r ( t ) f o 1 ( t ) )
where h decreases exponentially from 1 to 0, and  f g 1 , f g 2 , and f g 3 are three random solutions:
g 1 = r a n d ( 1 , 1 ) , g 2 = r a n d ( 0 , 1 ) , g 3 = r a n d ( 2 , 2 ) .
The candidate searching around the promising areas in the search space is performed by finding the best fitness using the following equations:
D = r 1 ( V ( t ) 1 )
V ( t + 1 ) = V ( t ) + D ( 2 r 2 1 )
P ( t + 1 ) = P b e s t ( i ) K 1 | K 2 P b e s t ( i ) P ( i ) | if R < 0.5 P ( i ) + V ( i + 1 ) o t h e r w i s e

4.3.2. Exploitation Group

This group is responsible for finding the candidate solutions around the best solutions found so far. Searching around the best solution targets finding a much better solution. This search process is performed using the following formulation:
D = P ( t ) ( K r 4 )
V ( t + 1 ) = V ( t ) + D . ( 2 r 5 1 )
K = 1 2 k X t 2 S o l u t i o n s c o u n t 2
V ( i + 1 ) = K 3 V ( i ) + K 4 r 1 ( P b e s t ( i ) P ( i ) ) + K 5 r 2 ( P G b e s t P ( i ) )
where i is the iteration number, in which P ( i ) is the average bird position,  P b e s t ( i ) is the position of the best bird, and  V ( i + 1 ) is the bird’s velocity at iteration i + 1 K 1 , K 2 , and  K 3 are weight values, and K 4 and  K 5 are constants.  r 1 and r 2 are random values in the range [ 0 , 1 ] .

4.3.3. Balance between Exploration and Exploitation

Maintaining the proper balance between exploration and extraction is critical to the success of the proposed DWDTO algorithm. After assigning 50% of the population to exploration and the other 50% to exploitation, the algorithm adjusts accordingly in the beginning. Figure 4 and Figure 5 depict the dynamic balancing between the exploration and exploitation groups in the proposed approach. To begin with, having a large number of persons in the exploration group helps with discovering new areas of the search space. Exploitation individuals grow in quantity over time, whereas exploration persons decrease dynamically over time. This allows more people to enhance their overall fitness by allowing additional exploitation of individuals to improve their overall fitness. It also utilizes an elitism method to keep the process’s leader in place if no better solution can be found for fresh populations, assuring convergence. A DWDTO exploration group may expand to include more members when the leader’s fitness level does not improve enough to prevent local optima and stagnation issues after three consecutive runs.

4.3.4. Binary Optimizer

In order to choose the best set of features to improve the classification accuracy, the output of the proposed DWDTO is transformed into binary {0, 1} using the sigmoid function represented by the following equation:
P b ( t + 1 ) = 1 if S i g m o i d ( P B e s t ) 0.5 0 o t h e r w i s e , S i g m o i d ( P B e s t ) = 1 1 + e 10 ( P B e s t 0.5 )
where P B e s t refers to the best position, and t is the iteration number. The fitness function employed to measure the goodness of the candidate solution of selection features is represented by the following equation:
F n = w 1 E r r o r ( P ) + w 2 N u m b e r o f s e l e c t e d f e a t u r e s T o t a l n u m b e r o f f e a t u r e s
where P is a solution, w 1 [ 0 , 1 ] , and  w 2 = 1 w 1 , which are used to manage the importance of the number of the selected feature for population with size n and the classification error rate. The steps of the proposed feature selection algorithm are presented in Algorithm 3.
Algorithm 3 The proposed feature selection algorithm (binary bDWDTO)
1:
Input population, size, fitness function
2:
Output best set of features
3:
Initialize Set DWDTO parameters
4:
Calculate objective function and select best solutions
5:
Convert solutions to binary {0, 1}
6:
Train k-NN and calculate error
7:
Set t = 1 , M a x i t e r = 100
8:
while t M a x i t e r  do
9:
     Apply DWDTO algorithm
10:
   Convert solutions to binary
11:
   Calculate Fitness
12:
   Update Positions
13:
end while
14:
Return   X *

5. Experimental Results

The assessment of the proposed algorithms is performed in terms of two datasets. Firstly, the mobile KeyStroke Dynamics (KSD) Data Set [38] of which the first scenario denotes the experimental results. Secondly, the touch-screen-phone-based keystroke dynamics dataset [39], of which the second scenario represents the experimental results. The following sections discuss the achieved effects in both scenarios.

5.1. Evaluation Criteria

The performance measures in Table 2 are used to assess how well the the proposed algorithms perform. For the first set of measurements, the performance of the feature selection process is measured. On the other hand, the second set of measures is utilized to evaluate the performance of the proposed optimized BRNN classification. The best solution at run j is represented by g j * , and s i z e ( g j * ) refers to the size of the best solution vector. The number of optimizer runs is shown in the table as M. There are a total of N points in the test set, and C i is the output label result from the used classifier. The point i’s class label is L i , and the total number of features is D. True Positive, True Negative, False Positive, and False Negative are referred to as T P , T N , F P , and F N , respectively.

5.2. Results of the First Scenario

The first set of experiments recorded from the first dataset targets measuring the performance of the proposed feature selection algorithm. The results are presented in Table 3. In this table, the proposed bDWDTO algorithm achieves the best results compared to eleven other feature selection algorithms. These results show the superiority of the proposed feature selection algorithm.
The convergence of the feature selection algorithm is recorded and represented by the plot shown in Figure 6. As shown in this figure, the proposed algorithm achieves the fastest convergence, which makes it superior to the other feature selection methods.
In addition, the time profile of the proposed feature selection algorithm compared to the other competing algorithms is presented in Table 4 for the datasets D1 and D2. In this table, the processing time using the proposed feature selection algorithm consumes the smallest timestamp, which gives another perspective of the superiority of the proposed algorithm.
On the other hand, selecting the proper machine learning model is realized by evaluating the performance of three machine learning models and then determining the best performing model. Table 5 presents the results of user authentication using Neural Networks (NN), K-Nearest Neighbors (KNN), and BRNN. The best results are achieved using BRNN for all evaluation criteria and thus adopted for further steps of the proposed approach.
On the other hand, the evaluation of the proposed DWDTO algorithm is measured in terms of optimizing the BRNN network and analyzing the results. Table 6 presents the statistical analysis of the recorded results based on the proposed optimization algorithm and five other optimization algorithms. In this table, the proposed optimization algorithms are proven to achieve better performance than the other competing algorithms for the 20 samples in the test set. The maximum accuracy achieved by the proposed algorithm is (98.89%), whereas the best accuracy achieved by the other algorithms is (96.12%), which is achieved by GWO when used to optimize the BRNN model.
The significance of the proposed algorithm is measured using the Wilcoxon signed rank test and one-way Analysis of Variance (ANOVA) test. The results of these tests are presented in Table 7 and Table 8, respectively. To prove that the proposed DWDTO algorithm is significantly different from all the other competing algorithms, we calculate the p-values between the two algorithms. This study uses Wilcoxon’s rank-sum test. This test has two basic hypotheses: the null and the alternative hypotheses. μ D W D T O = μ G W O , μ D W D T O = μ W O A , μ D W D T O = μ P S O , μ D W D T O = μ G A , and μ D W D T O = μ G S A are the mean, μ , values of the null hypothesis represented by H0. However, the H1 hypothesis does not take into account the algorithms’ capabilities when comparing the results. The Wilcoxon rank-sum test results are shown in Table 7. The suggested algorithm’s p-values are less than 0.05 compared to those of the other methods. These findings show that the suggested feature selection strategy is better and statistically significant. The ANOVA test examines the statistical differences between the proposed DWDTO algorithm and the other methods. The null hypothesis’s mean values, indicated by H0, include μ D W D T O = μ G W O = μ W O A = μ P S O = μ G A = μ G S A . Table 8 shows the results of the ANOVA test as assessed. As illustrated in Figure 7, we have the residual plot, followed by the homoscedasticity plot and the QQ plots. The residual error and homoscedasticity values are both within −0.03 and +0.025, as shown in the plots of the figure, indicating the robustness of the suggested technique. The QQ figure also demonstrates that projected outcomes match actual values, which confirms that the proposed algorithm is robust. The heat map plot, on the other hand, indicates how the algorithm stacks up against other competing methods in the literature.

5.3. Results of the Second Scenario

Similarly, the evaluation of the proposed algorithms using the second dataset, D2, is performed in terms of the feature selection and the optimization algorithms. The results of the assessment of the feature selection algorithm are presented in Table 9 based on the adopted evaluation criteria. In addition, the convergence curve of the feature selection using the proposed and other competing algorithms is shown in Figure 8. These results emphasize the superiority of the proposed feature selection algorithms in terms of the second dataset.
Moreover, the best machine learning model that fits the keystroke data in the second dataset is applied by evaluating three machine learning models and selecting the best-performing model. Table 10 presents the evaluation of the three models. In this table, the best performing model is BRNN and thus selected for optimization and categorizing smartphone users based on keystroke data.
Similar to the analysis performed on the results of optimizing BRNN using the proposed algorithm on the first dataset, the same analysis is performed on the results achieved on the second dataset (D2). Table 11, Table 12 and Table 13 present the statistical analysis, Wilcoxon signed-rank test and ANOVA test. The results presented in these tables confirm the superiority and effectiveness of the proposed optimization algorithm.
Moreover, the visual plots shown in Figure 9 represent the performance of the proposed algorithm in categorizing smartphone users based on the second dataset (D2). These plots are the residual, homoscedasticity, QQ, and heatmap. The results represented by these plots emphasize the effectiveness of the proposed optimization algorithm.

5.4. Classification Results

The classification results using the optimized BRNN are recorded and measured in terms of the adopted evaluation criteria mentioned in the previous section. The results are presented in Table 14. As shown in this table, the proposed optimization algorithm could achieve a promising performance with accuracy greater than (99%) on both D1 and D2. The other evaluation criteria recorded in the table confirm the effectiveness of the proposed algorithm.

5.5. Comparison with Other Methods

To emphasize the superiority of the proposed optimization algorithm, a set of experiments was conducted to prove the expected findings. Figure 10 shows the average time over the two datasets. In this figure, the proposed feature selection algorithm achieves the shortest average time, represented by a red star.
In addition, Figure 11 and Figure 12 show the histograms of the accuracy achieved by optimizing BRNN using the proposed optimization algorithm and other five optimization algorithms on both D1 and D2. As shown in this figure, the proposed algorithm achieves the best performance for almost all the test samples. These results show the superiority of the proposed optimization algorithm.
Moreover, the plots shown in Figure 13 present an additional comparison between the proposed optimization algorithm and other algorithms in terms of the accuracy and ROC curves. These plots confirm the expected findings and prove the superiority of the proposed algorithm.

6. Conclusions

Keystroke-dynamics-based smartphone user authentication can by improved by using meta-heuristic optimization. Using the proposed optimization algorithm, referred to as DWDTO, a Bidirectional Recurrent Neural Network is optimized to boost the categorization accuracy of smartphone users. The optimization algorithm was put to the test to see if it could accurately reflect the authenticated user while also performing better than standard optimization methods in terms of user categorization. In order to evaluate the categorization performance of the proposed algorithm, two datasets were compared. Three classifiers were also assessed for utilizing the optimization algorithm to evaluate their user categorization performance. The data features obtained via smartphone and feature selection algorithm were all set to the same for accurate comparison of categorization performance with other competing methods. Consequently, it was discovered that the proposed optimization algorithm provided superior classification performance over the existing methods. Classification of datasets using the optimized classifier was validated. The data collection approach described in this study has a high potential for use as one of the data collecting methods for keystroke-data-based authentication systems based on the principal findings of this investigation. In addition, a statistical analysis is performed to measure the stability and effectiveness of the proposed algorithms. The results confirm the superiority and stability of the proposed algorithms when compared with other competing algorithms.

Author Contributions

Formal analysis, E.-S.M.E.-K. and A.A.A.; Investigation, N.K.; Methodology, A.I.; Resources, S.M.; Visualization, M.M.E. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Abualigah, L.; Elaziz, M.A.; Khodadadi, N.; Forestiero, A.; Jia, H.; Gandomi, A.H. Aquila Optimizer Based PSO Swarm Intelligence for IoT Task Scheduling Application in Cloud Computing. In Integrating Meta-Heuristics and Machine Learning for Real-World Optimization Problems; Springer: Berlin/Heidelberg, Germany, 2022; pp. 481–497. [Google Scholar]
  2. Sharma, R.; Sharma, V.K.; Singh, A. A Review Paper on Facial Recognition Techniques. In Proceedings of the 2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 11–13 November 2021; pp. 617–621. [Google Scholar]
  3. Ali, M.M.; Mahale, V.H.; Yannawar, P.; Gaikwad, A.T. Overview of fingerprint recognition system. In Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India, 3–5 March 2016; pp. 1334–1338. [Google Scholar]
  4. Daniel, D.M.; Monica, B. Person authentication technique using human iris recognition. In Proceedings of the 2010 9th International Symposium on Electronics and Telecommunications, Timisoara, Romania, 11–12 November 2010; pp. 265–268. [Google Scholar]
  5. Kaveh, A.; Eslamlou, A.D.; Khodadadi, N. Dynamic water strider algorithm for optimal design of skeletal structures. Period. Polytech. Civ. Eng. 2020, 64, 904–916. [Google Scholar] [CrossRef]
  6. Kaveh, A.; Talatahari, S.; Khodadadi, N. Stochastic paint optimizer: Theory and application in civil engineering. Eng. Comput. 2022, 38, 1921–1952. [Google Scholar] [CrossRef]
  7. Kaveh, A.; Khodadadi, N.; Talatahari, S. A comparative study for the optimal design of steel structures using CSS and ACSS algorithms. Int. J. Optim. Civ. Eng 2021, 11, 31–54. [Google Scholar]
  8. Khodadadi, N.; Abualigah, L.; Mirjalili, S. Multi-objective Stochastic Paint Optimizer (MOSPO). Neural Comput. Appl. 2022, 2022, 1–24. [Google Scholar] [CrossRef]
  9. Khodadadi, N.; Mirjalili, S. Truss optimization with natural frequency constraints using generalized normal distribution optimization. Appl. Intell. 2022, 52, 10384–10397. [Google Scholar] [CrossRef]
  10. Kaveh, A.; Talatahari, S.; Khodadadi, N. The Hybrid Invasive Weed Optimization-Shuffled Frog-leaping Algorithm Applied to Optimal Design of Frame Structures. Period. Polytech. Civ. Eng. 2019, 63, 882–897. [Google Scholar] [CrossRef]
  11. Ryu, Y.S.; Koh, D.H.; Aday, B.L.; Gutierrez, X.A.; Platt, J.D. Usability Evaluation of Randomized Keypad. J. Usability Study 2010, 5, 65–75. [Google Scholar]
  12. Spillane, R. Keyboard apparatus for personal identification. IBM Tech. Discl. Bull. 1975, 17, 3346. [Google Scholar]
  13. Umphress, D.; Williams, G. Identity verification through keyboard characteristics. Int. J. Man-Mach. Stud. 1985, 23, 263–273. [Google Scholar] [CrossRef]
  14. Campisi, P.; Maiorana, E.; Lo Bosco, M.; Neri, A. User authentication using keystroke dynamics for cellular phones. IET Signal Process. 2009, 3, 333. [Google Scholar] [CrossRef]
  15. Lee, H.; Hwang, J.Y.; Kim, D.I.; Lee, S.; Lee, S.H.; Shin, J.S. Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. Secur. Commun. Netw. 2018, 2018, 2567463. [Google Scholar] [CrossRef]
  16. Cockell, R.; Halak, B. On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics. Cryptography 2020, 4, 12. [Google Scholar] [CrossRef]
  17. Alsultan, A.; Warwick, K.; Wei, H. Non-conventional keystroke dynamics for user authentication. Pattern Recognit. Lett. 2017, 89, 53–59. [Google Scholar] [CrossRef]
  18. Kim, J.; Kang, P. Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recognit. 2020, 108, 107556. [Google Scholar] [CrossRef]
  19. Kiyani, A.T.; Lasebae, A.; Ali, K.; Rehman, M.U.; Haq, B. Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach. IEEE Access 2020, 8, 156177–156189. [Google Scholar] [CrossRef]
  20. Porwik, P.; Doroz, R.; Wesolowski, T.E. Dynamic keystroke pattern analysis and classifiers with competence for user recognition. Appl. Soft Comput. 2021, 99, 106902. [Google Scholar] [CrossRef]
  21. Saini, B.S.; Singh, P.; Nayyar, A.; Kaur, N.; Bhatia, K.S.; El-Sappagh, S.; Hu, J.W. A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics. IEEE Access 2020, 8, 125909–125922. [Google Scholar] [CrossRef]
  22. Jalaly Bidgoly, A.; Jalaly Bidgoly, H.; Arezoumand, Z. A survey on methods and challenges in EEG based authentication. Comput. Secur. 2020, 93, 101788. [Google Scholar] [CrossRef]
  23. Ingale, M.; Cordeiro, R.; Thentu, S.; Park, Y.; Karimian, N. ECG Biometric Authentication: A Comparative Analysis. IEEE Access 2020, 8, 117853–117866. [Google Scholar] [CrossRef]
  24. Maiti, A.; Crager, K.; Jadliwala, M.; He, J.; Kwiat, K.; Kamhoua, C. RandomPad: Usability of Randomized Mobile Keypads for Defeating Inference Attacks. In Proceedings of the IEEE Euro Workshop on Innovations in Mobile Privacy & Security (IMPS), Paris, France, 29 April 2017; pp. 1–10. [Google Scholar]
  25. Benjapatanamongkol, N.; Bhattarakosol, P. A Preliminary Study of Finger Area and Keystroke Dynamics Using Numeric Keypad With Random Numbers on Android Phones. In Proceedings of the 2019 23rd International Computer Science and Engineering Conference (ICSEC), Phuket, Thailand, 30 October–1 November 2019; pp. 30–34. [Google Scholar]
  26. Yu, E.; Cho, S. GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In Proceedings of the International Joint Conference on Neural Networks, 2003, Portland, OR, USA, 20–24 July 2003; Volume 3, pp. 2253–2257. [Google Scholar]
  27. Azevedo, G.L.F.B.G.; Cavalcanti, G.D.C.; Carvalho Filho, E.C.B. An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting. In Proceedings of the 2007 IEEE Congress on Evolutionary Computation, Singapore, 25–28 September 2007; pp. 3577–3584. [Google Scholar]
  28. Karnan, M.; Muthuramalingam, A.; Kalamani, A. Feature subset selection in keystroke dynamics using ant colony optimization. J. Eng. Technol. Res. 2009, 1, 72–80. [Google Scholar]
  29. Karnan, M.; Akila, M. Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques. In Proceedings of the 2010 Second International Conference on Communication Software and Networks, Singapore, 26–28 February 2010; pp. 334–338. [Google Scholar]
  30. Solami, E.A.; Boyd, C.; Clark, A.; Ahmed, I. User-representative feature selection for keystroke dynamics. In Proceedings of the 2011 5th International Conference on Network and System Security, Milan, Italy, 6–8 September 2011; pp. 229–233. [Google Scholar]
  31. El-Kenawy, E.S.M.; Mirjalili, S.; Alassery, F.; Zhang, Y.D.; Eid, M.M.; El-Mashad, S.Y.; Aloyaydi, B.A.; Ibrahim, A.; Abdelhamid, A.A. Novel Meta-Heuristic Algorithm for Feature Selection, Unconstrained Functions and Engineering Problems. IEEE Access 2022, 10, 40536–40555. [Google Scholar] [CrossRef]
  32. Abdelhamid, A.A.; El-Kenawy, E.S.M.; Alotaibi, B.; Amer, G.M.; Abdelkader, M.Y.; Ibrahim, A.; Eid, M.M. Robust Speech Emotion Recognition Using CNN+LSTM Based on Stochastic Fractal Search Optimization Algorithm. IEEE Access 2022, 10, 49265–49284. [Google Scholar] [CrossRef]
  33. Sami Khafaga, D.; Ali Alhussan, A.; El-kenawy, E.S.M.; Takieldeen, A.E.; Hassan, T.M.; Hegazy, E.A.; Eid, E.A.F.; Ibrahim, A.; Abdelhamid, A.A. Meta-heuristics for Feature Selection and Classification in Diagnostic Breast-Cancer. Comput. Mater. Contin. 2022, 73, 749–765. [Google Scholar]
  34. Choi, M.; Lee, S.; Jo, M.; Shin, J.S. Keystroke dynamics-based authentication using unique keypad. Sensors 2021, 21, 2242. [Google Scholar] [CrossRef] [PubMed]
  35. Sami Khafaga, D.; Ali Alhussan, A.; El-kenawy, E.S.M.; Ibrahim, A.; Abd Elkhalik, S.H.; El-Mashad, S.Y.; Abdelhamid, A.A. Improved Prediction of Metamaterial Antenna Bandwidth Using Adaptive Optimization of LSTM. Comput. Mater. Contin. 2022, 73, 865–881. [Google Scholar] [CrossRef]
  36. Abdel Samee, N.; El-Kenawy, E.S.M.; Atteia, G.; Jamjoom, M.M.; Ibrahim, A.; Abdelhamid, A.A.; El-Attar, N.E.; Gaber, T.; Slowik, A.; Shams, M.Y. Metaheuristic Optimization Through Deep Learning Classification of COVID-19 in Chest X-Ray Images. Comput. Mater. Contin. 2022, 73, 4193–4210. [Google Scholar]
  37. Nasser AlEisa, H.; El-kenawy, E.S.M.; Ali Alhussan, A.; Saber, M.; Abdelhamid, A.A.; Sami Khafaga, D. Transfer Learning for Chest X-rays Diagnosis Using Dipper Throated Algorithm. Comput. Mater. Contin. 2022, 73, 2371–2387. [Google Scholar]
  38. MEU-Mobile KSD Data Set. Available online: https://archive.ics.uci.edu/ml/datasets/MEU-Mobile+KSD (accessed on 28 June 2022).
  39. RHU KeyStroke Dynamics Benchmark Dataset. Available online: https://www.coolestech.com/rhu-keystroke/ (accessed on 28 June 2022).
Figure 1. Time feature structure [34].
Figure 1. Time feature structure [34].
Mathematics 10 02912 g001
Figure 2. Motion data of smartphone reference axis [34].
Figure 2. Motion data of smartphone reference axis [34].
Mathematics 10 02912 g002
Figure 3. Typical Structure of Bidirectional Recurrent Neural Network shown at step three.
Figure 3. Typical Structure of Bidirectional Recurrent Neural Network shown at step three.
Mathematics 10 02912 g003
Figure 4. The exploration exploitation balance during the optimization process.
Figure 4. The exploration exploitation balance during the optimization process.
Mathematics 10 02912 g004
Figure 5. The balance dynamic between exploration and exploitation groups in the proposed optimization algorithm.
Figure 5. The balance dynamic between exploration and exploitation groups in the proposed optimization algorithm.
Mathematics 10 02912 g005
Figure 6. The convergence plot based on the proposed and other competing feature algorithms when applied to the first dataset (D1).
Figure 6. The convergence plot based on the proposed and other competing feature algorithms when applied to the first dataset (D1).
Mathematics 10 02912 g006
Figure 7. Visual representation of the results achieved by the proposed optimization algorithm in terms of the first dataset (D1).
Figure 7. Visual representation of the results achieved by the proposed optimization algorithm in terms of the first dataset (D1).
Mathematics 10 02912 g007
Figure 8. The convergence plot based on the proposed and other competing feature algorithms when applied to the second dataset (D2).
Figure 8. The convergence plot based on the proposed and other competing feature algorithms when applied to the second dataset (D2).
Mathematics 10 02912 g008
Figure 9. Visual representation of the results achieved by the proposed optimization algorithm in terms of the second dataset (D2).
Figure 9. Visual representation of the results achieved by the proposed optimization algorithm in terms of the second dataset (D2).
Mathematics 10 02912 g009
Figure 10. Average processing time (in seconds) using the proposed optimization algorithm and the other competing optimization algorithms. The red star refers to the minimum average processing time which is achieved by the proposed bDWDTO algorithm.
Figure 10. Average processing time (in seconds) using the proposed optimization algorithm and the other competing optimization algorithms. The red star refers to the minimum average processing time which is achieved by the proposed bDWDTO algorithm.
Mathematics 10 02912 g010
Figure 11. Histogram of the accuracy achieved by the proposed approach and other optimization approaches in terms of the first dataset (D1).
Figure 11. Histogram of the accuracy achieved by the proposed approach and other optimization approaches in terms of the first dataset (D1).
Mathematics 10 02912 g011
Figure 12. Histogram of the accuracy achieved by the proposed approach and other optimization approaches in terms of the second dataset (D2).
Figure 12. Histogram of the accuracy achieved by the proposed approach and other optimization approaches in terms of the second dataset (D2).
Mathematics 10 02912 g012
Figure 13. Comparison between the performance of the proposed optimization algorithm and the other competing algorithms applied to the two datasets, D1 and D2.
Figure 13. Comparison between the performance of the proposed optimization algorithm and the other competing algorithms applied to the two datasets, D1 and D2.
Mathematics 10 02912 g013
Table 1. Summary of the relevant articles published in the literature.
Table 1. Summary of the relevant articles published in the literature.
Ref.MethodologyResult
[12]Keystroke dynamicsFalse FRR = 12%, FAR = 6%
[15]Keystroke dynamicsEER = 15%
[16]Motion sensorsEER = 8.94%
[25]Random keypadEER = 10%
[34]Unique KeypadEER = 4.15%
Table 2. Metrics used in evaluating the proposed algorithms.
Table 2. Metrics used in evaluating the proposed algorithms.
MetricEquation
Average fitness 1 M i = 1 M g * i
Worst Fitness m a x i = 1 M g * i
Best fitness m i n i = 1 M g * i
Average Error 1 M j = 1 M 1 N i = 1 N m s e ( C i , L i )
Average select size 1 M i = 1 M s i z e ( g * i )
Standard deviation 1 M 1 i = 1 M g * i M e a n 2
Accuracy T P + T N T P + T N + F P + F N
N-value (NPV) T N T N + F N
p-value (PPV) T P T P + F P
Sensitivity (TPR) T P T P + F N
Specificity (TNR) T N T N + F P
F1-Score T P T P + 0.5 ( F P + F N )
Table 3. Evaluation results of the feature selection results achieved by the proposed algorithm and other competing algorithms when applied to the first dataset (D1).
Table 3. Evaluation results of the feature selection results achieved by the proposed algorithm and other competing algorithms when applied to the first dataset (D1).
AlgorithmAvg. ErrorAvg. Select SizeAvg. FitnessBest FitnessWorst FitnessStd Fitness
bDWDTO0.5100.6540.5370.4420.6370.345
bGWO0.5230.7180.5730.4620.6560.364
bGWO_PSO0.5160.7130.5560.5390.6170.348
bPSO0.5140.8480.5600.4620.6750.372
bSFS0.5220.6720.5740.5230.5970.364
bWAO0.5110.9430.5610.5000.6750.359
bMGWO0.5200.7640.5390.4900.6560.355
bMVO0.5110.8180.5610.5200.6360.352
bSBO0.5280.8330.5680.5200.6360.360
bGWO_GA0.5320.7930.5320.5200.6360.357
bFA0.5170.8530.5670.5000.6950.363
bGA0.5110.8130.5610.4620.6360.363
Table 4. Time profile (in seconds) of the proposed feature selection algorithm and other algorithms.
Table 4. Time profile (in seconds) of the proposed feature selection algorithm and other algorithms.
AlgorithmD1D2
bDWDTO12.53412.952
bGWO13.17814.883
bGWO_PSO12.7714.02
bPSO12.8614.455
bSFS14.2614.21
bWAO12.66713.788
bMGWO12.9513.49
bMVO13.12114.395
bSBO13.5914.42
bGWO_GA13.3114.69
bFA13.88814.472
bGA13.13414.408
Table 5. Performance evaluation of the machine learning models applied to the first dataset (D1).
Table 5. Performance evaluation of the machine learning models applied to the first dataset (D1).
MetricNNKNNBRNN
Accuracy0.9170.9220.939
Sensitivity (TPR)0.8620.8700.901
Specificity (TNR)0.9800.9800.980
Pvalue (PPV)0.9800.9800.980
Nvalue (NPV)0.8620.8700.901
F-score0.9170.9220.939
Time (seconds)137125102
Table 6. Statistical analysis of the achieved results using the proposed DWDTO applied to the first dataset (D1).
Table 6. Statistical analysis of the achieved results using the proposed DWDTO applied to the first dataset (D1).
MetricDWDTO + BRNNGWOWOAPSOGAGSA
Num. Values202020202020
Minimum0.98890.96120.93780.95980.95230.9563
25%0.99000.97120.95780.96850.96230.9563
Median0.99000.97120.95780.96850.96230.9563
75%0.99000.97120.95780.96850.96230.9563
Maximum0.99270.98120.96980.97980.97230.9763
Range0.00380.02000.03200.02000.02000.0200
Mean0.99010.97120.95740.96860.96230.9582
Std.0.00070.00320.00530.00330.00320.0050
Std. Error0.00010.00070.00120.00070.00070.0011
Skewness3.2895.703 × 10 14 −2.1711.26303.014
Kurtosis14.799.511.7410.259.59.335
Sum19.819.4219.1519.3719.2519.16
Table 7. Wilcoxon signed-rank test of the achieved results using the first dataset (D1).
Table 7. Wilcoxon signed-rank test of the achieved results using the first dataset (D1).
MetricDWDTO + BRNNGWOWOAPSOGAGSA
Theo. median000000
Act. median0.990.97120.95780.96850.96230.9563
Num. Values202020202020
Sum ranks210210210210210210
Sum +ranks210210210210210210
Sum −ranks000000
p value<0.0001<0.0001<0.0001<0.0001<0.0001<0.0001
SignificanceYesYesYesYesYesYes
Discrepancy0.990.97120.95780.96850.96230.9563
Table 8. One-way analysis of variance test of the achieved results using the first dataset (D1).
Table 8. One-way analysis of variance test of the achieved results using the first dataset (D1).
SSDFMSF (DFn, DFd)p Value
Treatment0.0124640.003115F (4, 95) = 256.8p < 0.0001
Residual0.001152950.00001213
Total0.0136199
Table 9. Evaluation results of the feature selection results achieved by the proposed and other competing algorithms when applied to the second dataset (D2).
Table 9. Evaluation results of the feature selection results achieved by the proposed and other competing algorithms when applied to the second dataset (D2).
AlgorithmAvg. ErrorAvg. Select SizeAvg. FitnessBest FitnessWorst FitnessStd Fitness
bDWDTO0.4470.4490.4590.4070.5580.345
bGWO0.4600.5790.4940.4240.5680.355
bGWO_PSO0.4610.6030.4610.4490.5170.351
bPSO0.4880.8030.5210.4580.5760.346
bSFS0.4670.6270.4670.4140.6000.387
bWAO0.4730.6440.5070.4330.5930.355
bMGWO0.4490.5670.4910.4570.5760.350
bMVO0.4820.7840.5150.4160.5590.352
bSBO0.4680.7430.4680.4410.5430.350
bGWO_GA0.5070.7370.5070.4920.6020.359
bFA0.4780.8000.5120.4070.6100.360
bGA0.4680.7030.5020.4410.6190.360
Table 10. Evaluation of the performance of machine learning models applied to the second dataset (D2).
Table 10. Evaluation of the performance of machine learning models applied to the second dataset (D2).
MetricNNKNNBRNN
Accuracy0.9320.9410.955
Sensitivity (TPR)0.8570.8950.895
Specificity (TNR)0.9890.9890.993
p-value (PPV)0.9840.9880.988
N-value (NPV)0.9000.9000.938
F-score0.9160.9390.939
Time (seconds)11810797
Table 11. Statistical analysis of the achieved results using the proposed DWDTO applied to the second dataset (D2).
Table 11. Statistical analysis of the achieved results using the proposed DWDTO applied to the second dataset (D2).
MetricDWDTO + BRNNGWOWOAPSOGAGSA
Num. Values202020202020
Minimum0.98990.96890.94650.95990.97000.9471
25%0.99340.97890.96650.96890.98000.9571
Median0.99340.97890.96650.96890.98000.9571
75%0.99340.97890.96800.96890.98000.9571
Maximum0.99340.98890.97670.97290.99000.9771
Range0.00340.02000.03010.01300.02000.0300
Mean0.99320.97880.96730.96860.98000.9581
Std.0.00080.00330.00610.00230.00320.0055
Std. Error0.00020.00070.00140.00050.00070.0012
Skewness−4.4720.0496−1.694−2.964−5.703 × 10 14 2.164
Kurtosis209.3797.40213.369.58.21
Sum19.8619.5819.3519.3719.619.16
Table 12. Wilcoxon signed-rank test of the achieved results using the second dataset (D2).
Table 12. Wilcoxon signed-rank test of the achieved results using the second dataset (D2).
MetricDWDTO + BRNNGWOWOAPSOGAGSA
Theo. median000000
Act. median0.99340.97890.96650.96890.980.96
Num. Values202020202020
Sum ranks210210210210210210
Sum +ranks210210210210210210
Sum −ranks000000
p-value<0.0001<0.0001<0.0001<0.0001<0.0001<0.0001
SignificanceYesYesYesYesYesYes
Discrepancy0.99340.97890.96650.96890.980.96
Table 13. One-way analysis of variance test of the achieved results using the second dataset (D2).
Table 13. One-way analysis of variance test of the achieved results using the second dataset (D2).
SSDFMSF (DFn, DFd)p Value
Treatment0.00873340.002183F (4, 95) = 170.9p < 0.0001
Residual0.001214950.00001278
Total0.00994699
Table 14. The performance of the BRNN after optimization using the proposed DWDTO applied to the two datasets, D1 and D2.
Table 14. The performance of the BRNN after optimization using the proposed DWDTO applied to the two datasets, D1 and D2.
MetricD1D2
Accuracy0.9901828030.993208829
Sensitivity (TRP)0.9465478840.965909091
Specificity (TNP)0.9980039920.998003992
p-value (PPV)0.9883720930.988372093
N-value (NPV)0.9904912840.994035785
F-Score0.9670079640.977011494
Time (seconds)7759
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

El-Kenawy, E.-S.M.; Mirjalili, S.; Abdelhamid, A.A.; Ibrahim, A.; Khodadadi, N.; Eid, M.M. Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users. Mathematics 2022, 10, 2912. https://doi.org/10.3390/math10162912

AMA Style

El-Kenawy E-SM, Mirjalili S, Abdelhamid AA, Ibrahim A, Khodadadi N, Eid MM. Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users. Mathematics. 2022; 10(16):2912. https://doi.org/10.3390/math10162912

Chicago/Turabian Style

El-Kenawy, El-Sayed M., Seyedali Mirjalili, Abdelaziz A. Abdelhamid, Abdelhameed Ibrahim, Nima Khodadadi, and Marwa M. Eid. 2022. "Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users" Mathematics 10, no. 16: 2912. https://doi.org/10.3390/math10162912

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop