2019
DOI: 10.1109/tdsc.2016.2645208
|View full text |Cite
|
Sign up to set email alerts
|

PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(32 citation statements)
references
References 21 publications
0
32
0
Order By: Relevance
“…In 2019, Quintal et al [48] analysed the mobile user continuous authentications in IoT, and classified these authentication factors into event capture types such as password, fingerprint, applications start and end, network connection and disconnection, continuous sequence of events, such as gestures, and derived behavioural features, such as application choice, and demonstrated that all factors are correlated with the actual user identity. Currently, lots of multimodal continuous authentications are proposed in smartphone, IoT [49][50][51].…”
Section: Multimodal-fusion-based Authentication Schemesmentioning
confidence: 99%
“…In 2019, Quintal et al [48] analysed the mobile user continuous authentications in IoT, and classified these authentication factors into event capture types such as password, fingerprint, applications start and end, network connection and disconnection, continuous sequence of events, such as gestures, and derived behavioural features, such as application choice, and demonstrated that all factors are correlated with the actual user identity. Currently, lots of multimodal continuous authentications are proposed in smartphone, IoT [49][50][51].…”
Section: Multimodal-fusion-based Authentication Schemesmentioning
confidence: 99%
“…This means that the user does not have to actively take a security measure (e.g. PIN input), but the system checks and analyses the behavior of the user in the background [22]. In this context, we speak of dynamic or continuous authentication because user behavior is checked while the device or application is being used.…”
Section: Behavioral Biometrics 33mentioning
confidence: 99%
“…When legitimate and illegitimate users have vastly different behaviors, existing IA schemes can achieve high authentication accuracy. However, based on our preliminary simulation using the Friends and Family Dataset [29], [30], more than 70% of users' behavior data samples overlap and cannot be separated by simply setting a threshold 1 . As an example, we randomly selected two participants from the dataset, one as the legitimate user and the other as the illegitimate user, and converted their SVM output to probabilistic behavior scores.…”
Section: A System Overviewmentioning
confidence: 99%
“…Rich behavioral data gathered by various sensors embedded in smart devices facilitates the implicit authentication of users based on their behaviors [1]- [3]. In general, IA systems authenticate a user by matching her real-time behavior to her historical behavior.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation