2021
DOI: 10.1155/2021/6669429
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism

Abstract: Most of the current authentication mechanisms adopt the “one-time authentication,” which authenticate users for initial access. Once users have been authenticated, they can access network services without further verifications. In this case, after an illegal user completes authentication through identity forgery or a malicious user completes authentication by hijacking a legitimate user, his or her behaviour will become uncontrollable and may result in unknown risks to the network. These kinds of insider attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 41 publications
(39 reference statements)
0
1
0
Order By: Relevance
“…An investigation of several consequences and causes of node capture attacks and classification in terms of adversary's capabilities, attack targets and vulnerabilities was done. Multimodal Fusion-based Continuous Authentication (MFCA) scheme was proposed by Guan et al [41] to protect data confidentiality and avoid attacks. The scheme verified user identities constantly by collecting multidimensional behaviour characteristics through online procedure, and locks out users if any strange behaviours were noticed.…”
Section: Literature Surveymentioning
confidence: 99%
“…An investigation of several consequences and causes of node capture attacks and classification in terms of adversary's capabilities, attack targets and vulnerabilities was done. Multimodal Fusion-based Continuous Authentication (MFCA) scheme was proposed by Guan et al [41] to protect data confidentiality and avoid attacks. The scheme verified user identities constantly by collecting multidimensional behaviour characteristics through online procedure, and locks out users if any strange behaviours were noticed.…”
Section: Literature Surveymentioning
confidence: 99%