Behavioral biometrics & continuous user authentication on mobile devices: A survey

被引:61
|
作者
Stylios, Ioannis [1 ]
Kokolakis, Spyros [1 ]
Thanou, Olga [1 ]
Chatzis, Sotirios [2 ]
机构
[1] Univ Aegean, Dept ICSE, North Aegean, Greece
[2] Cyprus Univ Technol, Dept EECEI, Limassol, Cyprus
关键词
Machine Learning; Behavioral Biometrics; Continuous Authentication; Mobile Devices; Attacks; Defense; Survey; FUSION; VERIFICATION; SMARTPHONES; TECHNOLOGY; ACCEPTANCE; ATTACKS; IMAGE; TEETH; VOICE; USAGE;
D O I
10.1016/j.inffus.2020.08.021
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our aim is to help interested researchers to effectively grasp the background in this field and to avoid pitfalls in their work. In our survey, we first present a classification of behavioral biometrics technologies and continuous authentication for mobile devices and an analysis for behavioral biometrics collection methodologies and feature extraction techniques. Then, we provide a state-of-the-art literature review focusing on the machine learning models performance in seven types of behavioral biometrics for continuous authentication. Further, we conduct another review that showed the vulnerability of machine learning models against well-designed adversarial attack vectors and we highlight relevant countermeasures. Finally, our discussions extend to lessons learned, current challenges and future trends.
引用
收藏
页码:76 / 99
页数:24
相关论文
共 50 条
  • [21] Stationary mobile behavioral biometrics: A survey
    -Dowling, Aratrika
    Hou, Daqing
    Schuckers, Stephanie
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [22] Multimodal Continuous User Authentication on Mobile Devices via Interaction Patterns
    Zhang, Xiaomei
    Zhang, Pengming
    Hu, Haomin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [23] Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
    Eberz, Simon
    Rasmussen, Kasper B.
    Lenders, Vincent
    Martinovic, Ivan
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 386 - 399
  • [24] Implementing Biometrics-Based Authentication for Mobile Devices
    Abeni, Paolo
    Baltatu, Madalina
    D'Alessandro, Rosalia
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [25] Biometric Authentication & Identification through Behavioral Biometrics: A Survey
    Pahuja, Gunjan
    Nagabhushan, T. N.
    [J]. 2015 INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING AND INFORMATION PROCESSING (CCIP), 2015,
  • [26] Passive User Authentication Utilizing Behavioral Biometrics for IIoT Systems
    Zhao, Guozhu
    Zhang, Pinchang
    Shen, Yulong
    Jiang, Xiaohong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12783 - 12798
  • [27] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [28] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [29] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [30] Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication
    Buriro, Attaullah
    Crispo, Bruno
    DelFrari, Filippo
    Wrona, Konrad
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 276 - 285