A Survey on Adaptive Authentication

被引:25
作者
Arias-Cabarcos, Patricia [1 ]
Krupitzer, Christian [2 ]
Becker, Christian [1 ]
机构
[1] Univ Mannheim, L15,1-6, D-69161 Mannheim, Germany
[2] Univ Wurzburg, D-97074 Wurzburg, Germany
关键词
Adaptive authentication; usable security; systematic literature review; USER AUTHENTICATION; USABILITY EVALUATION; ARCHITECTURE; SECURITY; DESIGN; PASSWORDS; IDENTITY; DECISION; IMPLICIT; OPTIONS;
D O I
10.1145/3336117
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Adaptive Authentication allows a system to dynamically select the best mechanism(s) for authenticating a user depending on contextual factors, such as location, proximity to devices, and other attributes. Though this technology has the potential to change the current password-dominated authentication landscape, research to date has not led to practical solutions that transcend to our daily lives. Motivated to find out how to improve adaptive authentication design, we provide a structured survey of the existing literature to date and analyze it to identify and discuss current research challenges and future directions.
引用
收藏
页数:30
相关论文
共 116 条
[61]   FESAS IDE: An Integrated Development Environment for Autonomic Computing [J].
Krupitzer, Christian ;
Roth, Felix Maximilian ;
Becker, Christian ;
Weckesser, Markus ;
Lochau, Malte ;
Schuerr, Andy .
2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, :15-24
[62]   A survey on engineering approaches for self-adaptive systems [J].
Krupitzer, Christian ;
Roth, Felix Maximilian ;
VanSyckel, Sebastian ;
Schiele, Gregor ;
Becker, Christian .
PERVASIVE AND MOBILE COMPUTING, 2015, 17 :184-206
[63]   Trust-enhanced Security in Location-based Adaptive Authentication [J].
Lenzini, Gabriele ;
Bargh, Mortaza S. ;
Hulsebosch, Bob .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) :105-119
[64]  
Lima JCD, 2011, ACM INT SYM MOB MAN, P83
[65]  
Liu Zhan, 2016, J MOB MULTIMED, V12, p[1, 159]
[66]  
Lockhart H., 2008, OASIS COMM DRAFT, V2, P94
[67]   Self-adaptive systems: A survey of current approaches, research challenges and applications [J].
Macias-Escriva, Frank D. ;
Haber, Rodolfo ;
del Toro, Raul ;
Hernandez, Vicente .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (18) :7267-7279
[68]   The Venn of identity - Options and issues in federated identity management [J].
Maler, Eve ;
Reed, Drummond .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :16-23
[69]  
Mansour A, 2016, 2016 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), pP278
[70]   Survey of multi-objective optimization methods for engineering [J].
Marler, RT ;
Arora, JS .
STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION, 2004, 26 (06) :369-395