Continuous User Authentication on Mobile Devices

被引:191
作者
Patel, Vishal M. [1 ,2 ]
Chellappa, Rama [3 ,4 ,5 ,6 ]
Chandra, Deepak [7 ]
Barbello, Brandon [8 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD USA
[3] Univ Maryland, Elect & Comp Engn ECE, College Pk, MD 20742 USA
[4] Univ Maryland, Comp Sci, College Pk, MD 20742 USA
[5] Univ Maryland, Inst Adv Comp Studies, Ctr Automat Res, College Pk, MD 20742 USA
[6] ECE Dept, College Pk, MD USA
[7] Google Inc, Machine Intelligence & Res Grp, Mountain View, CA USA
[8] Google Res & Machine Intelligence, Mountain View, CA USA
关键词
Authentication; Sensors; Smart phones; Communication technology; ACTIVE AUTHENTICATION;
D O I
10.1109/MSP.2016.2555335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field. © 2016 IEEE.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 75 条
[11]  
[Anonymous], P GI C SICH SICH SCH
[12]  
[Anonymous], 2015, POW SYST C PSC 2015, DOI DOI 10.1109/PSC.2015.7101716
[13]  
[Anonymous], 2016, SOUPS 14 P 10 S US P
[14]  
[Anonymous], 2015, 2015 IEEE 7 INT C BI
[15]  
Aviv AJ., 2010, P 4 USENIX C OFF TEC, V10, P1
[16]  
Bassu D, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), P441, DOI 10.1109/THS.2013.6699045
[17]  
Braz Christina., 2006, Proceedings of the 18th Conference on l'Interaction Homme-Machine, P199, DOI DOI 10.1145/1132736.1132768
[18]   A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices [J].
Chang, Ting-Yi ;
Tsai, Cheng-Jung ;
Lin, Jyun-Hao .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (05) :1157-1165
[19]   Sensor-Assisted Facial Recognition: An Enhanced Biometric Authentication System for Smartphones [J].
Chen, Shaxun ;
Pande, Amit ;
Mohapatra, Prasant .
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2014, :109-122
[20]  
Clarke N, 2011, TRANSPARENT USER AUTHENTICATION: BIOMETRICS, RFID AND BEHAVIOURAL PROFILING, P1, DOI 10.1007/978-0-85729-805-8