2018
DOI: 10.3390/s18113769
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Security and QoE in Mobile Devices through an Intelligent and Adaptive Continuous Authentication System

Abstract: Continuous authentication systems for mobile devices focus on identifying users according to their behaviour patterns when they interact with mobile devices. Among the benefits provided by these systems, we highlight the enhancement of the system security, having permanently authenticated the users; and the improvement of the users’ quality of experience, minimising the use of authentication credentials. Despite the benefits of these systems, they also have open challenges such as the authentication accuracy a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…Then, it was designed the app in charge of collecting the data and, finally, the framework itself was designed as well. It is important to mention that some parts of this project rely on a previous work of our research team [ 3 , 19 ]. This allowed for the adaptation and extension of some of its software (for example, the data collection application), and also for helpful discussions that avoided duplication of research efforts, and enhanced the insight about the open research issues of the sensors and statistics based authentication problem.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Then, it was designed the app in charge of collecting the data and, finally, the framework itself was designed as well. It is important to mention that some parts of this project rely on a previous work of our research team [ 3 , 19 ]. This allowed for the adaptation and extension of some of its software (for example, the data collection application), and also for helpful discussions that avoided duplication of research efforts, and enhanced the insight about the open research issues of the sensors and statistics based authentication problem.…”
Section: Methodsmentioning
confidence: 99%
“…The smartphone application is the first component of the S3 Platform, and its objective is to monitor data in real time, to allow the S3 platform to calculate the user’s authentication level. The design and most of the configuration parameters in the smartphone application are based on results from our previous work [ 3 , 19 ]. For the work described in this paper, a new version of the application used in such previous work has been developed.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Activity recognition has been widely identified in today’s literature as human activity trackers for continuous authentication of users in IoT scenarios. Many works make use of IoT devices such as smart watches , providing gesture interaction and a permanent monitoring of physical activities [25]; wrist-worn devices for extraction of raw accelerometer data to recognize walking, standing, sitting, and lying activities [26]; smartphones to identify the owner periodically by using machine learning (ML) techniques based on anomaly detection for an adaptive continuous authentication system [27]; and wearable glasses to discriminate the real owner of the smart object from a potential impersonator using biometric features taken from touch gestures and voice commands [28]. Experiments of this last work, conducted using Google Glasses, showed above 93% detection rate using the collected features.…”
Section: Related Workmentioning
confidence: 99%