Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

Continuous multimodal biometric authentication schemes: a systematic review

R Ryu, S Yeom, SH Kim, D Herbert - IEEE Access, 2021 - ieeexplore.ieee.org
Building safeguards against illegitimate access and authentication is a cornerstone for
securing systems. Existing user authentication schemes suffer from challenges in detecting …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z Jin, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …

GaitCode: Gait-based continuous authentication using multimodal learning and wearable sensors

I Papavasileiou, Z Qiao, C Zhang, W Zhang, J Bi, S Han - Smart Health, 2021 - Elsevier
The ever-growing threats of security and privacy loss from unauthorized access to mobile
devices have led to the development of various biometric authentication methods for easier …

Leveraging user-related internet of things for continuous authentication: A survey

L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

Gait-based continuous authentication using a novel sensor compensation algorithm and geometric features extracted from wearable sensors

S Lee, S Lee, E Park, J Lee, IY Kim - IEEE Access, 2022 - ieeexplore.ieee.org
With the rapid development of networking and computing technology, users can easily store
and interact with sensitive information on smart devices. Since smart devices are vulnerable …