Sensor-Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey

被引:101
作者
Abuhamad, Mohammed [1 ]
Abusnaina, Ahmed [2 ]
Nyang, Daehun [3 ]
Mohaisen, David [2 ]
机构
[1] Loyola Univ Chicago, Dept Comp Sci, Chicago, IL 60660 USA
[2] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
[3] Ewha Womans Univ, Dept Cyber Secur, Seoul 03760, South Korea
关键词
Authentication; Biometrics (access control); Sensors; Physiology; Knowledge based systems; Smart phones; Continuous authentication; mobile sensing; sensor-based authentication; smartphone authentication; SPEAKER IDENTIFICATION; KEYSTROKE DYNAMICS; PERSONAL AUTHENTICATION; MULTIMODAL BIOMETRICS; MOBILE DEVICES; ORIENTATION; FEATURES; PATTERN; MOTION; MODEL;
D O I
10.1109/JIOT.2020.3020076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices and technologies have become increasingly popular, offering comparable storage and computational capabilities to desktop computers allowing users to store and interact with sensitive and private information. The security and protection of such personal information are becoming more and more important since mobile devices are vulnerable to unauthorized access or theft. User authentication is a task of paramount importance that grants access to legitimate users at the point of entry and continuously through the usage session. This task is made possible with today's smartphones' embedded sensors that enable continuous and implicit user authentication by capturing behavioral biometrics and traits. In this article, we survey more than 140 recent behavioral biometric-based approaches for continuous user authentication, including motion-based methods (28 studies), gait-based methods (19 studies), keystroke dynamics-based methods (20 studies), touch gesture-based methods (29 studies), voice-based methods (16 studies), and multimodal-based methods (34 studies). The survey provides an overview of the current state-of-the-art approaches for continuous user authentication using behavioral biometrics captured by smartphones' embedded sensors, including insights and open challenges for adoption, usability, and performance.
引用
收藏
页码:65 / 84
页数:20
相关论文
共 186 条
[21]  
Bhatt S., 2013, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), P17, DOI 10.1109/ICPRIME.2013.6496441
[22]   Offline Signature Verification Using Pixel Matching Technique [J].
Bhattacharya, Indrajit ;
Ghosh, Prabir ;
Biswas, Swarup .
FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE: MODELING TECHNIQUES AND APPLICATIONS (CIMTA) 2013, 2013, 10 :970-977
[23]   A framework for developing mobile, context-aware applications [J].
Biegel, G ;
Cahill, V .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2004, :361-365
[24]  
Blanco-Gonzalo R., 2016, P 2016 IEEE INT CARN, P1
[25]  
Buchoux A., 2008, AUSTR INFORM SECURIT, P48
[26]   DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme [J].
Buriro, Attaullah ;
Crispo, Bruno ;
Gupta, Sandeep ;
Del Frari, Filippo .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :267-276
[27]  
Cai Liang., 2012, Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, P273
[28]   Mobile Based Continuous Authentication Using Deep Features [J].
Centeno, Mario Parreno ;
Guan, Yu ;
van Moorsel, Aad .
PROCEEDINGS OF THE 2018 INTERNATIONAL WORKSHOP ON EMBEDDED AND MOBILE DEEP LEARNING (EMDL '18), 2018, :19-24
[29]  
Chien-Cheng Lin, 2012, Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE 2012), P245, DOI 10.1109/SERE.2012.37
[30]   A Multisensor Mobile Interface for Industrial Environment and Healthcare Monitoring [J].
Choi, Subin ;
Kim, Dae Jung ;
Choi, Yun Young ;
Park, Kyeonghwan ;
Kim, Sung-Woo ;
Woo, Sung Hun ;
Kim, Jae Joon .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (03) :2344-2352