Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

被引:6
作者
Jeong, Jongkil Jay [1 ,2 ]
Zolotavkin, Yevhen [1 ,2 ]
Doss, Robin [1 ,2 ]
机构
[1] Cyber Secur Cooperat Res Ctr, Geelong, Vic, Australia
[2] Deakin Univ, Ctr Cyber Secur Res & Innovat CSRI, Geelong, Vic, Australia
关键词
Continuous Authentication; literature review; biometric authentication; Citation Network Analysis; CONTINUOUS USER AUTHENTICATION; KEYSTROKE DYNAMICS AUTHENTICATION; BEHAVIORAL BIOMETRICS; ACTIVE AUTHENTICATION; MOBILE DEVICES; SYSTEM; VERIFICATION; INTERNET;
D O I
10.1145/3533705
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Continuous Authentication (CA) technologies enable users to be authenticated beyond just the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to (a) identify the main components of CA research to date, and (b) explore the current gaps and future research directions. Through a Citation Network Analysis (CNA), we identified that there are currently three primary focus research areas on CA - Keystroke Dynamics; Mouse Movements; and Mobile Device Touch, as well as identify an emerging trend in more recent studies on multi-modal CA authentication which utilises the numerous sensors that are embedded in modern mobile devices. This study also highlights the current gaps in the literature such as the need for a consensus over how to evaluate the application and utility of CA, and the need to examine the feasibility of CA technologies that currently exist based on more use case studies.
引用
收藏
页数:31
相关论文
共 115 条
  • [1] Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey
    Abuhamad, Mohammed
    Abusnaina, Ahmed
    Nyang, Daehun
    Mohaisen, David
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 65 - 84
  • [2] WACA: Wearable-Assisted Continuous Authentication
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Akkaya, Kemal
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 264 - 269
  • [3] Biometric Recognition Based on Free-Text Keystroke Dynamics
    Ahmed, Ahmed A.
    Traore, Issa
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (04) : 458 - 472
  • [4] A new biometric technology based on mouse dynamics
    Ahmed, Ahmed Awad E.
    Traore, Issa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) : 165 - 179
  • [5] Al Abdulwahid A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P1
  • [6] Al Solami Eesa, 2010, Proceedings of the 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), P647, DOI 10.1109/HPCC.2010.65
  • [7] A survey on continuous authentication methods in Internet of Things environment
    Al-Naji, Fatimah Hussain
    Zagrouba, Rachid
    [J]. COMPUTER COMMUNICATIONS, 2020, 163 : 109 - 133
  • [8] Keystroke Biometric Systems for User Authentication
    Ali, Md Liakat
    Monaco, John V.
    Tappert, Charles C.
    Qiu, Meikang
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3): : 175 - 190
  • [9] Alotaibi Saud, 2017, SYSTEMATIC LIT REV B
  • [10] TAPSTROKE: A novel intelligent authentication system using tap frequencies
    Alpar, Orcan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2019, 136 (426-438) : 426 - 438