Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?

AR Ikuesan, HS Venter - Digital Investigation, 2019 - Elsevier
Abstract the need for a reliable and complementary identifier mechanism in a digital forensic
analysis is the focus of this study. Mouse dynamics have been applied in information …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Trueheart: Continuous authentication on wrist-worn wearables using ppg-based biometrics

T Zhao, Y Wang, J Liu, Y Chen… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
Traditional one-time user authentication processes might cause friction and unfavorable
user experience in many widely-used applications. This is a severe problem in particular for …

Is this really you? An empirical study on risk-based authentication applied in the wild

S Wiefling, L Lo Iacono, M Dürmuth - … and Privacy Protection: 34th IFIP TC …, 2019 - Springer
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-
based authentication. RBA monitors additional implicit features during password entry such …

Continuous user verification via respiratory biometrics

J Liu, Y Chen, Y Dong, Y Wang… - Ieee infocom 2020 …, 2020 - ieeexplore.ieee.org
The ever-growing security issues in various mobile applications and smart devices create an
urgent demand for a reliable and convenient user verification method. Traditional verification …

Combining keystroke and mouse dynamics for continuous user authentication and identification

S Mondal, P Bours - … on identity, security and behavior analysis …, 2016 - ieeexplore.ieee.org
In this paper, we analyze the performance of a continuous user authentication and
identification system for a PC under various analysis techniques. We applied a novel …

Continuous and transparent multimodal authentication: reviewing the state of the art

A Al Abdulwahid, N Clarke, I Stengel, S Furnell… - Cluster …, 2016 - Springer
Individuals, businesses and governments undertake an ever-growing range of activities
online and via various Internet-enabled digital devices. Unfortunately, these activities …

Zero trust federation: Sharing context under user control towards zero trust in identity federation

K Hatakeyama, D Kotani… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Perimeter models, which provide access control for protecting resources on networks, make
authorization decisions using the source network of access requests as one of critical …

[HTML][HTML] Combining user behavioural information at the feature level to enhance continuous authentication systems

AG Martín, IM de Diego, A Fernández-Isabel… - Knowledge-Based …, 2022 - Elsevier
The scientific and business communities are proposing new authentication methods more
robust than traditional solutions relying on a single security point such as passwords (ie …