Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

被引:85
作者
Liang, Yunji [1 ]
Samtani, Sagar [2 ]
Guo, Bin [1 ]
Yu, Zhiwen [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Peoples R China
[2] Indiana Univ, Operat & Decis Technol Dept, Kelley Sch Business, Tampa, FL 33602 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 09期
基金
美国国家科学基金会;
关键词
Authentication; Biometrics (access control); Internet of Things; Sensors; Knowledge based systems; Physiology; Smart phones; Artificial intelligence (AI); behavioral biometric; body area networks; constrained devices; continuous authentication (CA); cyber-physical systems data mining; Internet of Things (IoT); LEARNING BASED AUTHENTICATION; GAIT RECOGNITION; HUMAN IDENTIFICATION; NEURAL-NETWORK; MOBILE; VERIFICATION; DEVICES; SECURE; INFERENCE; ATTACKS;
D O I
10.1109/JIOT.2020.3004077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services. However, conventional knowledge-based and physiological biometric-based authentication systems (e.g., password, face recognition, and fingerprints) are susceptible to shoulder surfing attacks, smudge attacks, and heat attacks. The powerful sensing capabilities of IoT devices, including smartphones, wearables, robots, and autonomous vehicles enable continuous authentication (CA) based on behavioral biometrics. The artificial intelligence (AI) approaches hold significant promise in sifting through large volumes of heterogeneous biometrics data to offer unprecedented user authentication and user identification capabilities. In this survey article, we outline the nature of CA in IoT applications, highlight the key behavioral signals, and summarize the extant solutions from an AI perspective. Based on our systematic and comprehensive analysis, we discuss the challenges and promising future directions to guide the next generation of AI-based CA research.
引用
收藏
页码:9128 / 9143
页数:16
相关论文
共 167 条
  • [1] Stay Cool! Understanding Thermal Attacks on Mobile-based User Authentication
    Abdelrahman, Yomna
    Khamis, Mohamed
    Schneegass, Stefan
    Alt, Florian
    [J]. PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 3751 - 3763
  • [2] A Novel Biometric Approach for Human Identification and Verification Using Eye Blinking Signal
    Abo-Zahhad, M.
    Ahmed, Sabah M.
    Abbas, Sherif N.
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (07) : 876 - 880
  • [3] The effects of backpack carriage on gait kinematics and kinetics of schoolchildren
    Ahmad, Habibah N.
    Barbosa, Tiago M.
    [J]. SCIENTIFIC REPORTS, 2019, 9 (1)
  • [4] Transfer learning for class imbalance problems with inadequate data
    Al-Stouhi, Samir
    Reddy, Chandan K.
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 48 (01) : 201 - 228
  • [5] Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz
    Kalita, Jugal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1998 - 2026
  • [6] DeepAuth: A Framework for Continuous User Re-authentication in Mobile Apps
    Amini, Sara
    Noroozi, Vahid
    Pande, Amit
    Gupte, Satyajit
    Yu, Philip S.
    Kanich, Chris
    [J]. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 2027 - 2035
  • [7] [Anonymous], CONNECT TISSUE RES
  • [8] [Anonymous], 2015, ACM
  • [9] [Anonymous], 2018, PROC ACM INTERACT MO
  • [10] [Anonymous], 2016, STRUCTURED CONVOLUTI