Continuous User Authentication on Mobile Devices

被引:185
|
作者
Patel, Vishal M. [1 ,2 ]
Chellappa, Rama [3 ,4 ,5 ,6 ]
Chandra, Deepak [7 ]
Barbello, Brandon [8 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD USA
[3] Univ Maryland, Elect & Comp Engn ECE, College Pk, MD 20742 USA
[4] Univ Maryland, Comp Sci, College Pk, MD 20742 USA
[5] Univ Maryland, Inst Adv Comp Studies, Ctr Automat Res, College Pk, MD 20742 USA
[6] ECE Dept, College Pk, MD USA
[7] Google Inc, Machine Intelligence & Res Grp, Mountain View, CA USA
[8] Google Res & Machine Intelligence, Mountain View, CA USA
关键词
Authentication; Sensors; Smart phones; Communication technology; ACTIVE AUTHENTICATION;
D O I
10.1109/MSP.2016.2555335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field. © 2016 IEEE.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 50 条
  • [21] User authentication on mobile devices: Approaches, threats and trends
    Wang, Chen
    Wang, Yan
    Chen, Yingying
    Liu, Hongbo
    Liu, Jian
    COMPUTER NETWORKS, 2020, 170
  • [22] Beyond the PIN: Enhancing user authentication for mobile devices
    Centre for Information Security and Network Research, University of Plymouth, Plymouth, United Kingdom
    Comput. Fraud Secur., 2008, 8 (12-17):
  • [23] Reconciling user privacy and implicit authentication for mobile devices
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    Safa, Nashad Ahmed
    COMPUTERS & SECURITY, 2015, 53 : 215 - 233
  • [24] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [25] Implicit User Re-authentication for Mobile Devices
    Yazji, Sausan
    Chen, Xi
    Dick, Robert P.
    Scheuermann, Peter
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 325 - +
  • [26] A User Security Continuous Authentication Method for Earable Devices
    Wang, Yong
    Xiong, Yi
    Yang, Tianyu
    Shen, Yiran
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (11): : 2821 - 2834
  • [27] Swipe Gesture based Continuous Authentication for Mobile Devices
    Mondal, Soumik
    Bours, Patrick
    2015 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2015, : 458 - 465
  • [28] Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices
    Temper, Marlies
    Tjoa, Simon
    Kaiser, Manfred
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 30 - 35
  • [29] Continuous authentication on mobile devices using behavioral biometrics
    Dybczak, Jakub
    Nawrocki, Piotr
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 1028 - 1035
  • [30] Breaking two remote user authentication systems for mobile devices
    Li, Wenting
    Gu, Qianchen
    Zhao, Yiming
    Wang, Ping
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 37 - 42