Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

Continuous user identification in distance learning: a recent technology perspective

D Portugal, JN Faria, M Belk, P Martins… - Smart Learning …, 2023 - Springer
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …

Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones

H Xu, Y Zhou, MR Lyu - 10th Symposium On Usable Privacy and …, 2014 - usenix.org
Current smartphones generally cannot continuously authenticate users during runtime. This
poses severe security and privacy threats: A malicious user can manipulate the phone if …

A study on continuous authentication using a combination of keystroke and mouse biometrics

S Mondal, P Bours - Neurocomputing, 2017 - Elsevier
In this paper we focus on a context independent continuous authentication system that
reacts on every separate action performed by a user. We contribute with a robust dynamic …

Machine and deep learning applications to mouse dynamics for continuous user authentication

N Siddiqui, R Dave, M Vanamala, N Seliya - Machine Learning and …, 2022 - mdpi.com
Static authentication methods, like passwords, grow increasingly weak with advancements
in technology and attack strategies. Continuous authentication has been proposed as a …

Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data

D Crouse, H Han, D Chandra… - … on Biometrics (ICB), 2015 - ieeexplore.ieee.org
Mobile devices can carry large amounts of personal data, but are often left unsecured. PIN
locks are inconvenient to use and thus have seen low adoption (33% of users). While …

Continuous authentication using one-dimensional multi-resolution local binary patterns (1DMRLBP) in ECG biometrics

W Louis, M Komeili… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The objective of a continuous authentication system is to continuously monitor the identity of
subjects using biometric systems. In this paper, we proposed a novel feature extraction and …

Continuous authentication with touch behavioral biometrics and voice on wearable glasses

G Peng, G Zhou, DT Nguyen, X Qi… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Wearable glasses are on the rising edge of development with great user popularity.
However, user data stored on these devices bring privacy risks to the owner. To better …

Intrusion detection using mouse dynamics

M Antal, E Egyed‐Zsigmond - IET Biometrics, 2019 - Wiley Online Library
Compared to other behavioural biometrics, mouse dynamics is a less explored area.
General purpose data sets containing unrestricted mouse usage data are usually not …

A lightweight continuous authentication protocol for the Internet of Things

YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …