Continuous User Authentication on Mobile Devices

被引:183
|
作者
Patel, Vishal M. [1 ,2 ]
Chellappa, Rama [3 ,4 ,5 ,6 ]
Chandra, Deepak [7 ]
Barbello, Brandon [8 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[2] Univ Maryland, Inst Adv Comp Studies, College Pk, MD USA
[3] Univ Maryland, Elect & Comp Engn ECE, College Pk, MD 20742 USA
[4] Univ Maryland, Comp Sci, College Pk, MD 20742 USA
[5] Univ Maryland, Inst Adv Comp Studies, Ctr Automat Res, College Pk, MD 20742 USA
[6] ECE Dept, College Pk, MD USA
[7] Google Inc, Machine Intelligence & Res Grp, Mountain View, CA USA
[8] Google Res & Machine Intelligence, Mountain View, CA USA
关键词
Authentication; Sensors; Smart phones; Communication technology; ACTIVE AUTHENTICATION;
D O I
10.1109/MSP.2016.2555335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field. © 2016 IEEE.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 50 条
  • [1] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [2] Survey on NonObstructive and Continuous User Authentication on Mobile Devices
    Lalithamani, N.
    Balaji, Raam
    Dev, S. V. P. K. H. Satya
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [3] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [4] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    [J]. INFORMATION FUSION, 2021, 66 : 76 - 99
  • [5] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [6] Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns
    Zhang, Xiaomei
    Zhang, Pengming
    Hu, Haomin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [7] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [8] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [9] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [10] Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning
    Jose, Christy James
    Rajasree, M. S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1357 - 1372