2021
DOI: 10.1109/jiot.2020.3020076
|View full text |Cite
|
Sign up to set email alerts
|

Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
58
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(59 citation statements)
references
References 168 publications
1
58
0
Order By: Relevance
“…This allowed us to redefine the emission process of the HOrBAC digital parafer by proposing a version with in behaviour detection. The proposed detection algorithm can be used for continuous authentication [1,11]. Our approach resulted in a reduction of 89.12% of the deferred requests issued according to the experiment.…”
Section: Discussionmentioning
confidence: 97%
See 1 more Smart Citation
“…This allowed us to redefine the emission process of the HOrBAC digital parafer by proposing a version with in behaviour detection. The proposed detection algorithm can be used for continuous authentication [1,11]. Our approach resulted in a reduction of 89.12% of the deferred requests issued according to the experiment.…”
Section: Discussionmentioning
confidence: 97%
“…The purpose of this article is to optimise requests treatment in HOrBAC model to reduce the workload of hierarchical superiors involve in requests treatment (validation or rejection) and prevent denial of service. Our work focuses on digital parafer 1 which is the engine that secure the issuance and hierarchical treatment of requests in HOrBAC model. For this purpose, we propose an automatic approach for requests treatment, focusing on employees identities verification using multi-modal analysis of behavioural variables based on entropy measurement.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the authors also provided another review that showed the vulnerability of machine learning models against well-designed adversarial attack vectors, and they highlighted relevant countermeasures. A list of open challenges in behavioral biometrics can be found in [ 11 ]. If the reader is interested in IoT devices, aAn exciting survey can be found in [ 12 ], in which the authors present an overview of continuous authentication methods in the IoT environment and include those works based on BlockChain technology.…”
Section: Related Workmentioning
confidence: 99%
“…Improving solvers of stylometry problems is essential for enhancing various application domains, such as forensics, privacy (or anti-forensics), active-authentication [1]- [3], the detection of compromised accounts [4], recommender systems [5], deception detection, market analysis, and medical diagnosis [6], [7]. Author identification can also be accurately performed on program source codes [8], [9] as well as compiled binaries [10].…”
Section: Introductionmentioning
confidence: 99%