GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2022
DOI: 10.1109/globecom48099.2022.10000843
|View full text |Cite
|
Sign up to set email alerts
|

Novelty Detection for Risk-based User Authentication on Mobile Devices

Abstract: User authentication acts as the first line of defense verifying the identity of a mobile user, often as a prerequisite to allow access to resources in a mobile device. For several decades, user authentication was based on the ''something the user knows'', known also as knowledge-based user authentication. Recent studies state that although knowledge-based user authentication has been the most popular for authenticating an individual, nowadays it is no more considered secure and convenient for the mobile user a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
(41 reference statements)
0
3
0
Order By: Relevance
“…To the best of authors’ knowledge, this was the first time that novelty detection algorithms have been considered for risk-based user authentication. The findings in [ 48 , 52 ] highlighted the advantages of one-class novelty detection algorithms, presented in detail in Section 3.2.3 , over popular machine learning classifiers for risk-based user authentication.…”
Section: Quantitative Risk Estimation Approaches (Qreas)mentioning
confidence: 99%
See 1 more Smart Citation
“…To the best of authors’ knowledge, this was the first time that novelty detection algorithms have been considered for risk-based user authentication. The findings in [ 48 , 52 ] highlighted the advantages of one-class novelty detection algorithms, presented in detail in Section 3.2.3 , over popular machine learning classifiers for risk-based user authentication.…”
Section: Quantitative Risk Estimation Approaches (Qreas)mentioning
confidence: 99%
“…In particular, risk-based user authentication, relying on behavioral biometrics, normally involves single-user smartphone devices where it is necessary to differentiate between a known legitimate user and an unknown malicious user [ 52 ]. In this context, novelty detection algorithms, also known as one-class classifiers [ 54 , 55 , 56 ], have gained interest among researchers due to their potential advantages in user authentication based on behavioral biometrics.…”
Section: Quantitative Risk Estimation Approaches (Qreas)mentioning
confidence: 99%
“…Nevertheless, traditional password-based user authentication methods are no longer considered secure or practical for mobile users [5]- [8]. These methods authenticate anyone who possesses the correct credentials, regardless of whether they are the legitimate users or not [9]- [11]. Additionally, mobile users often struggle to remember complex passwords, resulting in weak passwords that are easily guessed or stolen through various attacks such as shoulder-surfing, dictionary or guessing attacks [12].…”
Section: Introductionmentioning
confidence: 99%