Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

User identification and authentication using multi-modal behavioral biometrics

KO Bailey, JS Okolica, GL Peterson - Computers & Security, 2014 - Elsevier
Biometric computer authentication has an advantage over password and access card
authentication in that it is based on something you are, which is not easily copied or stolen …

Keystroke dynamics on android platform

M Antal, LZ Szabó, I László - Procedia Technology, 2015 - Elsevier
Currently people store more and more sensitive data on their mobile devices. Therefore it is
highly important to strengthen the existing authentication mechanisms. The analysis of …

[HTML][HTML] CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things

FH Al-Naji, R Zagrouba - Journal of King Saud University-Computer and …, 2022 - Elsevier
Raising incidents of security threats among active sessions is an increasing concern in IoT
environment. Continuous authentication was introducing to be superior to traditional …

[HTML][HTML] Continuous authentication by free-text keystroke based on CNN and RNN

X Lu, S Zhang, P Hui, P Lio - Computers & Security, 2020 - Elsevier
Personal keystroke modes are difficult to imitate and can therefore be used for identity
authentication. The keystroke habits of a person can be learned according to the keystroke …

Continuous authentication by free-text keystroke based on CNN plus RNN

L Xiaofeng, Z Shengfei, Y Shengwei - Procedia computer science, 2019 - Elsevier
Personal keystroke mode is difficult to imitate and can therefore be used for identity
authentication. According to the keystroke data when a person inputs free text, the keystroke …

[PDF][PDF] Keystroke dynamics authentication: a survey of free-text methods

A Alsultan, K Warwick - International Journal of Computer Science …, 2013 - researchgate.net
Current computer systems depend greatly on authentication methods in order to provide
sufficient protection to the data handled by these systems. Rather than using the common …

A review on authentication methods

SZS Idrus, E Cherrier, C Rosenberger… - Australian Journal of …, 2013 - hal.science
The Internet has consolidated itself as a very powerful platform that has changed the
communication and business transactions. Now, the number of users navigating through the …