Security, Privacy, and Usability in Continuous Authentication: A Survey

被引:43
作者
Baig, Ahmed Fraz [1 ,2 ]
Eskeland, Sigurd [1 ]
机构
[1] Norwegian Comp Ctr, N-0373 Oslo, Norway
[2] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
关键词
continuous authentication; security; privacy; usability; user experience; ACTIVE AUTHENTICATION; RECOGNITION SYSTEMS; NEURAL-NETWORK; MOBILE; PROTECTION; USERS; VERIFICATION; PATTERN; ATTACKS; FUSION;
D O I
10.3390/s21175967
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.
引用
收藏
页数:26
相关论文
共 183 条
[1]  
Abeni P, 2006, GLOB TELECOMM CONF
[2]   A new multi-level approach to EEG based human authentication using eye blinking [J].
Abo-Zahhad, M. ;
Ahmed, Sabah M. ;
Abbas, Sherif N. .
PATTERN RECOGNITION LETTERS, 2016, 82 :216-225
[3]  
Abuhamad M., 2020, ARXIV200108578, DOI [10.1109/JIOT.2020.3020076, DOI 10.1109/JIOT.2020.3020076]
[4]   Recent Advances in Homomorphic Encryption [J].
Aguilar-Melchor, Carlos ;
Fau, Simon ;
Fontaine, Caroline ;
Gogniat, Guy ;
Sirdey, Renaud .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :108-117
[5]   Analysis of interaction trace maps for active authentication on smart devices [J].
Ahmad, Jamil ;
Sajjad, Muhammad ;
Jan, Zahoor ;
Mehmood, Irfan ;
Rho, Seungmin ;
Baik, Sung Wook .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (03) :4069-4087
[6]   Continuous and transparent multimodal authentication: reviewing the state of the art [J].
Al Abdulwahid, Abdulwahid ;
Clarke, Nathan ;
Stengel, Ingo ;
Furnell, Steven ;
Reich, Christoph .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01) :455-474
[7]   Privacy-Preserving Machine Learning: Threats and Solutions [J].
Al-Rubaie, Mohammad ;
Chang, J. Morris .
IEEE SECURITY & PRIVACY, 2019, 17 (02) :49-58
[8]   Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud [J].
Al-Rubaie, Mohammad ;
Chang, J. Morris .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2648-2663
[9]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[10]  
[Anonymous], 979832019 ISOIEC