dynamic keystroke

What complications arise in dynamic keystroke monitoring as a bio-metric authentication mechanism when the users’ keystrokes are sent over the internet? In particular, what characteristics of the keystroke sequences are valid, and which ones are distorted by the network?