2019
DOI: 10.1145/3314023
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging User-related Internet of Things for Continuous Authentication

Abstract: Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging these user-related IoT elements, it is possible to ensure the identity of the user for a period of time, thus avoiding impersonation. This need is known as Continuous Authentication (CA). Since 2009, a plethora of IoT-based CA academic research and industrial contributions have been proposed. We offer a comprehensive overview of 58 research papers regarding the main components of such a CA system. The status of the in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(24 citation statements)
references
References 115 publications
(187 reference statements)
0
24
0
Order By: Relevance
“…In order to define CA clearly, we mention two definitions provided in the literature. Traore [ 23 ] defines CA as “a new generation of security mechanisms that continuously monitor user behavior and use this as basis to re-authenticate them periodically …” Lorena et al [ 24 ] defines CA as “a security mechanism that monitors user actions at every point in time … during a session and determines if that user is the legitimate one.” These definitions are a bit limited and do not cover all aspects of CA. The first definition considers only behavioral biometrics, while the second definition does not clarify whether continuous authentication is achieved actively or passively.…”
Section: Modes Of Continuous Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to define CA clearly, we mention two definitions provided in the literature. Traore [ 23 ] defines CA as “a new generation of security mechanisms that continuously monitor user behavior and use this as basis to re-authenticate them periodically …” Lorena et al [ 24 ] defines CA as “a security mechanism that monitors user actions at every point in time … during a session and determines if that user is the legitimate one.” These definitions are a bit limited and do not cover all aspects of CA. The first definition considers only behavioral biometrics, while the second definition does not clarify whether continuous authentication is achieved actively or passively.…”
Section: Modes Of Continuous Authenticationmentioning
confidence: 99%
“…Moreover, the authors explained open problems and emerging necessities of a continuous authentication system as well. Gonzalez-Manzan et al [ 24 ] presented a comprehensive overview of different components of continuous authentication for the Internet of Things (IoT). Furthermore, this survey also focuses on the industrial status, ongoing research project contributions on continuous authentication, an overview of related standards, and different aspects proposal for future research directions for CA also presented in this survey.…”
Section: Related Surveysmentioning
confidence: 99%
“…A very recent (2019) survey [12] reviews the techniques for continuous authentication using Internet of Things devices. Another review provides an overview of the state of art on continuous authentication using mobile devices [1].…”
Section: Related Workmentioning
confidence: 99%
“…To reduce both intrusiveness and the number of authentication requests of traditional authentication systems, smartphones can use continuous authentication systems. Continuous authentication aims at providing identity confirmation by constantly assessing the confidence in the current user’s identity, therefore improving smartphone usability [ 2 ]. Continuous authentication validates users continuously, as they interact with the device, with no explicit user intervention.…”
Section: Introductionmentioning
confidence: 99%