Security, Privacy, and Usability in Continuous Authentication: A Survey

被引:37
作者
Baig, Ahmed Fraz [1 ,2 ]
Eskeland, Sigurd [1 ]
机构
[1] Norwegian Comp Ctr, N-0373 Oslo, Norway
[2] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
关键词
continuous authentication; security; privacy; usability; user experience; ACTIVE AUTHENTICATION; RECOGNITION SYSTEMS; NEURAL-NETWORK; MOBILE; PROTECTION; USERS; VERIFICATION; PATTERN; ATTACKS; FUSION;
D O I
10.3390/s21175967
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.
引用
收藏
页数:26
相关论文
共 183 条
  • [1] Abeni P, 2006, GLOB TELECOMM CONF
  • [2] A new multi-level approach to EEG based human authentication using eye blinking
    Abo-Zahhad, M.
    Ahmed, Sabah M.
    Abbas, Sherif N.
    [J]. PATTERN RECOGNITION LETTERS, 2016, 82 : 216 - 225
  • [3] Abuhamad M., 2020, ARXIV200108578, DOI [10.1109/JIOT.2020.3020076, DOI 10.1109/JIOT.2020.3020076]
  • [4] Recent Advances in Homomorphic Encryption
    Aguilar-Melchor, Carlos
    Fau, Simon
    Fontaine, Caroline
    Gogniat, Guy
    Sirdey, Renaud
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 108 - 117
  • [5] Analysis of interaction trace maps for active authentication on smart devices
    Ahmad, Jamil
    Sajjad, Muhammad
    Jan, Zahoor
    Mehmood, Irfan
    Rho, Seungmin
    Baik, Sung Wook
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) : 4069 - 4087
  • [6] Continuous and transparent multimodal authentication: reviewing the state of the art
    Al Abdulwahid, Abdulwahid
    Clarke, Nathan
    Stengel, Ingo
    Furnell, Steven
    Reich, Christoph
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 455 - 474
  • [7] Privacy-Preserving Machine Learning: Threats and Solutions
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (02) : 49 - 58
  • [8] Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2648 - 2663
  • [9] AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION
    ALTMAN, NS
    [J]. AMERICAN STATISTICIAN, 1992, 46 (03) : 175 - 185
  • [10] [Anonymous], 2015, 2015 IEEE 7 INT C BI, DOI [DOI 10.1109/BTAS.2015.7358784, 10.1109/BTAS.2015.7358784]