Security, Privacy, and Usability in Continuous Authentication: A Survey

被引:43
作者
Baig, Ahmed Fraz [1 ,2 ]
Eskeland, Sigurd [1 ]
机构
[1] Norwegian Comp Ctr, N-0373 Oslo, Norway
[2] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2815 Gjovik, Norway
关键词
continuous authentication; security; privacy; usability; user experience; ACTIVE AUTHENTICATION; RECOGNITION SYSTEMS; NEURAL-NETWORK; MOBILE; PROTECTION; USERS; VERIFICATION; PATTERN; ATTACKS; FUSION;
D O I
10.3390/s21175967
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.
引用
收藏
页数:26
相关论文
共 183 条
[31]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[32]  
Bringer J., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P257, DOI 10.1109/ICB.2012.6199817
[33]   Privacy-Preserving Biometric Identification Using Secure Multiparty Computation [J].
Bringer, Julien ;
Chabanne, Herve ;
Patey, Alain .
IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) :42-52
[34]   Authorship verification of e-mail and tweet messages applied for continuous authentication [J].
Brocardo, Marcelo Luiz ;
Traore, Issa ;
Woungang, Isaac .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1429-1440
[35]   Toward a Framework for Continuous Authentication using Stylometry [J].
Brocardo, Marcelo Luiz ;
Traore, Issa ;
Woungang, Isaac .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :106-115
[36]   Towards Passive Authentication using Inertia Variations: An Experimental Study on Smartphones [J].
Brown, James ;
Raval, Aaditya ;
Anwar, Mohd .
2020 SECOND INTERNATIONAL CONFERENCE ON TRANSDISCIPLINARY AI (TRANSAI 2020), 2020, :88-91
[37]   Real-time electrocardiogram streams for continuous authentication [J].
Camara, Carmen ;
Peris-Lopez, Pedro ;
Gonzalez-Manzano, Lorena ;
Tapiador, Juan .
APPLIED SOFT COMPUTING, 2018, 68 :784-794
[38]   Investigating fusion approaches in multi-biometric cancellable recognition [J].
Canuto, Anne M. P. ;
Pintro, Fernando ;
Xavier-Junior, Joao C. .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (06) :1971-1980
[39]  
Carroll Aaron, 2010, P 2010 USENIX C USEN, V14, P21, DOI DOI 10.5555/1855840.1855861
[40]   A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices [J].
Chang, Ting-Yi ;
Tsai, Cheng-Jung ;
Lin, Jyun-Hao .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (05) :1157-1165