Security, Privacy, and Usability in Continuous Authentication: A Survey

被引:37
作者
Baig, Ahmed Fraz [1 ,2 ]
Eskeland, Sigurd [1 ]
机构
[1] Norwegian Comp Ctr, N-0373 Oslo, Norway
[2] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
关键词
continuous authentication; security; privacy; usability; user experience; ACTIVE AUTHENTICATION; RECOGNITION SYSTEMS; NEURAL-NETWORK; MOBILE; PROTECTION; USERS; VERIFICATION; PATTERN; ATTACKS; FUSION;
D O I
10.3390/s21175967
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.
引用
收藏
页数:26
相关论文
共 183 条
  • [31] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [32] Bringer J., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P257, DOI 10.1109/ICB.2012.6199817
  • [33] Privacy-Preserving Biometric Identification Using Secure Multiparty Computation
    Bringer, Julien
    Chabanne, Herve
    Patey, Alain
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 42 - 52
  • [34] Authorship verification of e-mail and tweet messages applied for continuous authentication
    Brocardo, Marcelo Luiz
    Traore, Issa
    Woungang, Isaac
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) : 1429 - 1440
  • [35] Toward a Framework for Continuous Authentication using Stylometry
    Brocardo, Marcelo Luiz
    Traore, Issa
    Woungang, Isaac
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 106 - 115
  • [36] Towards Passive Authentication using Inertia Variations: An Experimental Study on Smartphones
    Brown, James
    Raval, Aaditya
    Anwar, Mohd
    [J]. 2020 SECOND INTERNATIONAL CONFERENCE ON TRANSDISCIPLINARY AI (TRANSAI 2020), 2020, : 88 - 91
  • [37] Real-time electrocardiogram streams for continuous authentication
    Camara, Carmen
    Peris-Lopez, Pedro
    Gonzalez-Manzano, Lorena
    Tapiador, Juan
    [J]. APPLIED SOFT COMPUTING, 2018, 68 : 784 - 794
  • [38] Investigating fusion approaches in multi-biometric cancellable recognition
    Canuto, Anne M. P.
    Pintro, Fernando
    Xavier-Junior, Joao C.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (06) : 1971 - 1980
  • [39] Carroll A., 2010, USENIXATC, P21, DOI DOI 10.5555/1855840.1855861
  • [40] A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
    Chang, Ting-Yi
    Tsai, Cheng-Jung
    Lin, Jyun-Hao
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (05) : 1157 - 1165