Continuous User Authentication on Mobile Devices

被引:185
|
作者
Patel, Vishal M. [1 ,2 ]
Chellappa, Rama [3 ,4 ,5 ,6 ]
Chandra, Deepak [7 ]
Barbello, Brandon [8 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD USA
[3] Univ Maryland, Elect & Comp Engn ECE, College Pk, MD 20742 USA
[4] Univ Maryland, Comp Sci, College Pk, MD 20742 USA
[5] Univ Maryland, Inst Adv Comp Studies, Ctr Automat Res, College Pk, MD 20742 USA
[6] ECE Dept, College Pk, MD USA
[7] Google Inc, Machine Intelligence & Res Grp, Mountain View, CA USA
[8] Google Res & Machine Intelligence, Mountain View, CA USA
关键词
Authentication; Sensors; Smart phones; Communication technology; ACTIVE AUTHENTICATION;
D O I
10.1109/MSP.2016.2555335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field. © 2016 IEEE.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 50 条
  • [31] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [32] Breaking Three Remote user Authentication Systems for Mobile Devices
    Li, Wenting
    Shen, Yaosheng
    Wang, Ping
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2018, 90 (8-9): : 1179 - 1190
  • [33] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [34] Fusion of Iris and Periocular User Authentication by AdaBoost for Mobile Devices
    Oishi, Shintaro
    Ichino, Masatsugu
    Yoshiura, Hiroshi
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 428 - 429
  • [35] Breaking Three Remote user Authentication Systems for Mobile Devices
    Wenting Li
    Yaosheng Shen
    Ping Wang
    Journal of Signal Processing Systems, 2018, 90 : 1179 - 1190
  • [36] User Authentication Method using Shaking Actions in Mobile Devices
    Lee, Tae Kyong
    Kim, Tae Guen
    Im, Eul Gyu
    2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 142 - 147
  • [37] User Authentication Interfaces in Mobile Devices: Some Design Considerations
    Liang, Hai-Ning
    Fleming, Charles
    Wang, Wei
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 754 - 757
  • [38] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [39] Continuous Mobile User Authentication Using Combined Biometric Traits
    Reichinger, Dominik
    Sonnleitner, Erik
    Kurz, Marc
    APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [40] User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) : 107 - 118