User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
Mobile devices have brought a great convenience to us these years, which allow the users
to enjoy the anytime and anywhere various applications such as the online shop** …

A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Performance analysis of multi-motion sensor behavior for active smartphone authentication

C Shen, Y Li, Y Chen, X Guan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The increasing use of smartphones as personal computing platforms to access personal
information has stressed the demand for secure and usable authentication techniques, and …

A survey on behavioral biometric authentication on smartphones

A Mahfouz, TM Mahmoud, AS Eldin - Journal of information security and …, 2017 - Elsevier
Recent research has shown the possibility of using smartphones' sensors and accessories
to extract some behavioral attributes such as touch dynamics, keystroke dynamics and gait …

TypeNet: Deep learning keystroke biometrics

A Acien, A Morales, JV Monaco… - … and Identity Science, 2021 - ieeexplore.ieee.org
We study the performance of Long Short-Term Memory networks for keystroke biometric
authentication at large scale in free-text scenarios. For this we explore the performance of …

Machine and deep learning applications to mouse dynamics for continuous user authentication

N Siddiqui, R Dave, M Vanamala, N Seliya - Machine Learning and …, 2022 - mdpi.com
Static authentication methods, like passwords, grow increasingly weak with advancements
in technology and attack strategies. Continuous authentication has been proposed as a …

Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes

S Gupta, C Maple, B Crispo, K Raja, A Yautsiukhin… - Pattern Recognition, 2023 - Elsevier
The proliferation of Internet of Things (IoT) systems is having a profound impact across all
aspects of life. Recognising and identifying particular users is central to delivering the …

Multi-touch authentication using hand geometry and behavioral information

Y Song, Z Cai, ZL Zhang - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
In this paper we present a simple and reliable authentication method for mobile devices
equipped with multi-touch screens such as smart phones, tablets and laptops. Users are …

Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities

AZ Zaidi, CY Chong, Z **, R Parthiban… - Journal of Network and …, 2021 - Elsevier
The advancement in the computational capability and storage size of a modern mobile
device has evolved it into a multi-purpose smart device for individual and business needs …