Continuous and transparent multimodal authentication: reviewing the state of the art

被引:29
作者
Al Abdulwahid, Abdulwahid [1 ,2 ]
Clarke, Nathan [1 ]
Stengel, Ingo [1 ]
Furnell, Steven [1 ]
Reich, Christoph [3 ]
机构
[1] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
[2] Jubail Univ Coll, Dept Comp Sci & Engn, Jubail Ind City, Saudi Arabia
[3] Furtwangen Univ Appl Sci, Inst Cloud Comp & IT Secur, Furtwangen, Germany
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2016年 / 19卷 / 01期
基金
英国工程与自然科学研究理事会;
关键词
User authentication; Authentication technologies; Security; Usability; Transparent authentication; Biometrics; Continuous authentication; USER IDENTITY VERIFICATION; IRIS RECOGNITION; BIOMETRICS; IDENTIFICATION; PRIVACY;
D O I
10.1007/s10586-015-0510-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner.
引用
收藏
页码:455 / 474
页数:20
相关论文
共 143 条
[1]  
Abdullah M. F. A., 2014, Journal of Theoretical and Applied Information Technology, V61, P193
[2]   Anomaly intrusion detection based on biometrics [J].
Ahmed, AAE ;
Traore, I .
Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, :452-453
[3]   A new biometric technology based on mouse dynamics [J].
Ahmed, Ahmed Awad E. ;
Traore, Issa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) :165-179
[4]  
Aksari Y, 2009, 2009 24TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, P569
[5]   Two Factor Authentication Using Mobile Phones [J].
Aloul, Fadi ;
Zahidi, Syed ;
El-Hajj, Wassim .
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, :641-+
[6]  
Altinok A., 2003, MULTIMODAL USER AUTH
[7]  
[Anonymous], 2013, P 2013 INT C BIOSIG
[8]  
[Anonymous], 2005, P ISONEWORLD 2005 LA
[9]  
[Anonymous], 2008, HDB BIOMETRICS
[10]  
[Anonymous], P 4 AS PAC C FRP STR