A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Leveraging user-related internet of things for continuous authentication: A survey

L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Deep learning approaches for continuous authentication based on activity patterns using mobile sensing

S Mekruksavanich, A Jitpattanakul - Sensors, 2021 - mdpi.com
Smartphones as ubiquitous gadgets are rapidly becoming more intelligent and context-
aware as sensing, networking, and processing capabilities advance. These devices provide …

SCANet: sensor-based continuous authentication with two-stream convolutional neural networks

Y Li, H Hu, Z Zhu, G Zhou - ACM Transactions on Sensor Networks …, 2020 - dl.acm.org
Continuous authentication monitors the security of a system throughout the login session on
mobile devices. In this article, we present SCANet, a two-stream convolutional neural …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

Towards continuous authentication on mobile phones using deep learning models

HC Volaka, G Alptekin, OE Basar, M Isbilen… - Procedia Computer …, 2019 - Elsevier
Smartphones have become essential objects for our daily lives. Besides their original
purpose of use, people use these devices as their personal assistants. Additionally …

Using siamese neural networks to perform cross-system behavioral authentication in virtual reality

R Miller, NK Banerjee… - 2021 IEEE Virtual Reality …, 2021 - ieeexplore.ieee.org
In this paper, we provide an approach on using behavioral biometrics to perform cross-
system high-assurance authentication of users in virtual reality (VR) environments. VR is …

Ensuring academic integrity and trust in online learning environments: A longitudinal study of an ai-centered proctoring system in tertiary educational institutions

CA Fidas, M Belk, A Constantinides, D Portugal… - Education …, 2023 - mdpi.com
The credibility of online examinations in Higher Education is hardened by numerous factors
and use-case scenarios. This paper reports on a longitudinal study, that spanned over …

Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …