Continuous authentication using biometrics: An advanced review

被引:31
作者
Dahia, Gabriel [1 ]
Jesus, Leone [1 ]
Pamplona Segundo, Mauricio [1 ]
机构
[1] Univ Fed Bahia, Dept Comp Sci, Salvador, BA, Brazil
关键词
Access control; biometric recognition; continuous authentication; FACE RECOGNITION; IDENTITY VERIFICATION; GAIT RECOGNITION; ECG; SIGNALS;
D O I
10.1002/widm.1365
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The shortcomings of conventional access control systems for high-security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session, continuous authentication systems regularly check users' identities to prevent hijackings. The challenges in this area involve balancing the security of protected assets by quickly detecting intruders with the system usability for genuine users. Biometric recognition plays a major role within this context, as it is the main way to assure that users are who they claim to be. A comparative analysis of the latest works revealed different aspects of this problem. First, some biometrics traits among those applied for continuous authentication are more suitable for this task than others. Second, systems combining multiple traits have advantages over those relying on a single one. Finally, many works fail to report proper evaluation metrics. With this in mind, we were able to identify new opportunities for researchers in the field. We highlight the potential for mining new datasets on the internet, which would benefit validation and benchmarking, and how recent deep learning techniques could address some of the open challenges in the area. This article is categorized under: Technologies > Prediction Technologies > Machine Learning Application Areas > Science and Technology
引用
收藏
页数:23
相关论文
共 86 条
[21]   Continuous Real-Time Vehicle Driver Authentication Using Convolutional Neural Network Based Face Recognition [J].
Derman, Ekberjan ;
Salah, Albert Ali .
PROCEEDINGS 2018 13TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE & GESTURE RECOGNITION (FG 2018), 2018, :577-584
[22]   Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics [J].
Eberz, Simon ;
Rasmussen, Kasper B. ;
Lenders, Vincent ;
Martinovic, Ivan .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[23]  
Fathy ME, 2015, INT CONF ACOUST SPEE, P1687, DOI 10.1109/ICASSP.2015.7178258
[24]   User identity verification via mouse dynamics [J].
Feher, Clint ;
Elovici, Yuval ;
Moskovitch, Robert ;
Rokach, Lior ;
Schclar, Alon .
INFORMATION SCIENCES, 2012, 201 :19-36
[25]  
Feng H., 2017, ABS170104507 CORR
[26]  
Feng T, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P451, DOI 10.1109/THS.2012.6459891
[27]  
Flior Eric, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P488, DOI 10.1109/ITNG.2010.250
[28]   Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication [J].
Frank, Mario ;
Biedert, Ralf ;
Ma, Eugene ;
Martinovic, Ivan ;
Song, Dawn .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :136-148
[29]   Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location [J].
Fridman, Lex ;
Weber, Steven ;
Greenstadt, Rachel ;
Kam, Moshe .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :513-521
[30]   Multi-modal decision fusion for continuous authentication [J].
Fridman, Lex ;
Stolerman, Ariel ;
Acharya, Sayandeep ;
Brennan, Patrick ;
Juola, Patrick ;
Greenstadt, Rachel ;
Kam, Moshe .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 :142-156