2022
DOI: 10.1145/3533705
|View full text |Cite
|
Sign up to set email alerts
|

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

Abstract: Continuous Authentication (CA) technologies enable users to be authenticated beyond just the point of entry. In this article, we conduct a comprehensive review of over 2300 articles to (a) identify the main components of CA research to date, and (b) explore the current gaps and future research directions. Through a Citation Network Analysis (CNA), we identified that there are currently three primary focus research areas on CA - Keystroke Dynamics; Mouse Movements; and Mobile Device Touch, as well as identify a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 96 publications
0
2
0
Order By: Relevance
“…The tokens are updated after each successful continuous authentication. Compared to static identity authentication that repeatedly resists quantum attacks for continuous identity verification, the proposed continuous identity authentication framework applies the token generated from initial authentication to the low consumption continuous authentication stage, ensuring the resistance to quantum attacks while reducing resource consumption 22–24 …”
Section: System Model and Protocol Designmentioning
confidence: 99%
“…The tokens are updated after each successful continuous authentication. Compared to static identity authentication that repeatedly resists quantum attacks for continuous identity verification, the proposed continuous identity authentication framework applies the token generated from initial authentication to the low consumption continuous authentication stage, ensuring the resistance to quantum attacks while reducing resource consumption 22–24 …”
Section: System Model and Protocol Designmentioning
confidence: 99%
“…Recently, technical aspects of CAuthN have been subject to an emerging number of publications in research on information security systems [1,49,88]. While the specific implementation of such systems varies, particularly in terms of the biometric data and features used, the underlying principle is mostly the same and is split into two phases [49]: (1) In the enrollment phase, the CAu-thN system learns the legitimate state or behavior using biometric traits gathered from a user's interaction, e.g., by training a machine learning model. (2) After completing the training, CAuthN uses the trained model in the authentication phase to assess the biometric traits arising out of the current use of the service.…”
Section: Continuous Authentication Systemsmentioning
confidence: 99%
“…To address this shortcoming, recent developments in authentication mechanisms suggest that apps and online services themselves should continuously elicit and process hard-to-spoof biometric features throughout the entire session to ensure that the actual legitimate user is using the app or online service [3]. This mechanism is referred to as Continuous Authentication (CAuthN) [49]. It extends entry point authentication systems with continuous session authentication, promising improvements to security without invading the systems' usability due to additional authentication steps required by the users.…”
Section: Introductionmentioning
confidence: 99%
“…Scholars quantified behavior information during human interactions with websites (Jeong et al, 2022) and then applied this as the fingerprint to discriminate the trustworthiness of the interactor's identity (Soltani et al, 2019). The current studies have looked at the behaviors of interactors visiting, browsing (Brown and Abramson, 2015), manipulating , and writing (Adeyemi et al, 2019) on the website.…”
Section: Prior Research On Discriminating the Trustworthiness Of Iden...mentioning
confidence: 99%