2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom) 2021
DOI: 10.1109/meditcom49071.2021.9647603
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Based User Authentication for Mobile Passenger ID Devices for Land and Sea Border Control

Abstract: Although the continuously increasing number of visitors entering the European Union through land-border crossing points or seaports brings tremendous economic benefits, novel border control solutions, such as mobile devices for passenger identification for land and sea border control, are essential to promote further the comfort of passengers. Nevertheless, the highly sensitive information handled by this type of devices makes them an attractive target for malicious actors. Therefore, novel secure and usable u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…In our previous publications [1]- [3], [9], we have presented: (i) a comprehensive review of related work on user authentication solutions for public safety and mobile devices, (ii) the security vs. usability challenge, (iii) the concept of the risk-based user authentication, as well as (iv) the HuMIdb dataset. In our most recent work [1], we have provided a thorough work on the design of a risk-based adaptive user authentication mechanism that comprises a secure and usable user authentication mechanism for mobile passenger identification (ID) devices for land/sea border control ensuring continuous user (i.e., officer) authentication behind-the-scenes and invisible to the user (i.e., officer).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous publications [1]- [3], [9], we have presented: (i) a comprehensive review of related work on user authentication solutions for public safety and mobile devices, (ii) the security vs. usability challenge, (iii) the concept of the risk-based user authentication, as well as (iv) the HuMIdb dataset. In our most recent work [1], we have provided a thorough work on the design of a risk-based adaptive user authentication mechanism that comprises a secure and usable user authentication mechanism for mobile passenger identification (ID) devices for land/sea border control ensuring continuous user (i.e., officer) authentication behind-the-scenes and invisible to the user (i.e., officer).…”
Section: Discussionmentioning
confidence: 99%
“…In particular, Risk-Based user Authentication (RBA) method based on behavioral biometrics appears to have the capacity to enhance the whole authentication process´s reliability without interrupting the user's normal activity by dynamically authenticating a genuine mobile user throughout their entire interaction with the mobile device, based on a risk score computed in real-time [6]- [8]. In our previous publications [1]- [3], [9], we have given: (i) a thorough review of user authentication solutions used in public safety and mobile devices, (ii) the security vs. usability challenge, (iii) the risk-based user authentication concept, as well as (iv) the HuMIdb dataset, which comprises the most recent and publicly available dataset for behavioral user authentication [10], [11].…”
Section: Introductionmentioning
confidence: 99%
“…Shang et al [ 72 ] stated that fuzzy logic models can work as a complement to probability models, assessing risks in cases where there are insufficient data and incomplete knowledge. According to them, fuzzy logic models are able to provide a framework where human reasoning and imprecise data can contribute to efficient risk analysis [ 72 ] in various environments including risk-based user authentication [ 48 , 73 ].…”
Section: Quantitative Risk Estimation Approaches (Qreas)mentioning
confidence: 99%
“…Unlike traditional authentication methods, which are typically performed only at the beginning of the session (i.e., one-shot authentication) and, afterwards, any future changes and/or abnormalities in user identity/behavior remain undetected, increasing the risk of sensitive information leakage and user's privacy violation, behavioral biometrics can enhance continuous authentication throughout the user's session [37], [38]. In other words, if a user's behavior changes, the system can detect this and prompt reauthentication.…”
Section: Continuous Authentication Enhancementmentioning
confidence: 99%