2019
DOI: 10.1504/ijbm.2019.096574
|View full text |Cite
|
Sign up to set email alerts
|

A survey on different continuous authentication systems

Abstract: There has been significant research in the provision of trustworthy initial login user authentication, however, there is still need for continuous authentication during a user session. Most mobile devices and computer systems authenticate a user only at the initial login session and do not take steps to recognise whether the present user is still the initial authorised user or an imposter pretending to be a valid user. Therefore, a system to check the identity of the user continuously throughout the whole sess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 34 publications
(31 reference statements)
0
9
0
Order By: Relevance
“…Ayeswarya and Norman () examines the pros and cons of various biometric traits for continuous authentication, focusing on behavioral traits and reaching different conclusions. Their work also lacks an analysis of evaluation metrics and temporal analysis.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ayeswarya and Norman () examines the pros and cons of various biometric traits for continuous authentication, focusing on behavioral traits and reaching different conclusions. Their work also lacks an analysis of evaluation metrics and temporal analysis.…”
Section: Introductionmentioning
confidence: 99%
“…We specifically highlight the opportunities brought about by the massive data now available on the internet that could aid in building new datasets for the problem, combined with the recent capability of training large neural networks. Ayeswarya and Norman (2019) examines the pros and cons of various biometric traits for continuous authentication, focusing on behavioral traits and reaching different conclusions. Their work also lacks an analysis of evaluation metrics and temporal analysis.…”
mentioning
confidence: 99%
“…In 2016, Patel et al [ 126 ] presented current progress and future challenges of CA on mobile devices. Ayeswary et al [ 175 ] also presented a brief overview of different CA methods, their merits, and demerits. Moreover, the authors explained open problems and emerging necessities of a continuous authentication system as well.…”
Section: Related Surveysmentioning
confidence: 99%
“…Despite the ever-increasing number of continuous authentication approaches, there is still a need to develop new techniques applicable in real life where a device owner does not operate with the smartphone continuously. However, there are many open issues in the current continuous authentication studies, including the lack of real-world dataset, the need for increased accuracy, low usability of current models, and lack of adaption of proposed models [3].…”
Section: Introductionmentioning
confidence: 99%
“…One of the prevalent biometric behaviors of smartphone users is touch dynamics, a promising approach recommended by many researchers because it requires no additional hardware to collect information; it has high usability and robust security [3][4][5][6]. While biometrics are easy to observe, once breached, they cannot be modified or revoked.…”
Section: Introductionmentioning
confidence: 99%