2022
DOI: 10.1109/access.2022.3164245
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 9 publications
(42 citation statements)
references
References 33 publications
0
42
0
Order By: Relevance
“…In our more recent work [13], we have provided a comprehensive work on the design of a risk-based adaptive user authentication mechanism that comprises a novel secure and usable user authentication solution. On top of that, we also modified adequately the "HuMIdb" dataset files, and we trained and tested the following most popular classification algorithms for risk-based authentication: K-NN, DT, SVM, and NB over the "HuMIdb" dataset using ten-fold cross validation.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our more recent work [13], we have provided a comprehensive work on the design of a risk-based adaptive user authentication mechanism that comprises a novel secure and usable user authentication solution. On top of that, we also modified adequately the "HuMIdb" dataset files, and we trained and tested the following most popular classification algorithms for risk-based authentication: K-NN, DT, SVM, and NB over the "HuMIdb" dataset using ten-fold cross validation.…”
Section: Discussionmentioning
confidence: 99%
“…In this way, it is suggested that risk-based user authentication mechanisms enhance the reliability of whole authentication process without interrupting the smartphone user's regular activity [9]. In our previous publications [10]- [13], we have presented: (i) a thorough review of related work on user authentication solutions for public safety and mobile devices, (ii) the security vs. usability challenge, (iii) the concept of the risk-based user authentication, as well as (iv) the HuMIdb dataset, which, to the best of our knowledge, is the most recent and publicly available dataset for behavioral user authentication [14], [15], as well as (v) a comprehensive work [13] on the design of a risk-based adaptive user authentication mechanism for mobile devices that comprises a novel secure and usable user authentication solution ensuring continuous user authentication behind-thescenes and invisible to the user.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although security and usability in mobile user authentication are often thought of as being contradictory, Risk-Based user Authentication (RBA) method has been extensively proposed in the literature to address this security vs. usability challenge enhancing security without sacrificing usability [1]- [5]. In particular, Risk-Based user Authentication (RBA) method based on behavioral biometrics appears to have the capacity to enhance the whole authentication process´s reliability without interrupting the user's normal activity by dynamically authenticating a genuine mobile user throughout their entire interaction with the mobile device, based on a risk score computed in real-time [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Inside this frame of reference, the industry and research community have identified blockchain technology as a disruptive technology that can be integrated into novel security solutions for IoMT edge networks, as it can support to: a) secure IoMT devices; and b) prevent unauthorized access during data transmission (i.e., tamper proof transmission of medical data) [3]. In spite of this, resource-constrained IoMT nodes (e.g., medical sensors, IoMT Gateways), which are the primary components of IoMT-based health monitoring systems [10], cannot afford the high resource requirements, in terms of computational cost and energy consumption of Proof-of-Work (PoW) consensus algorithms which are the most popular consensus algorithms for blockchain mechanisms in the industry [11]. On the other hand, lightweight algorithms have been proposed based on Practical Byzantine Fault Tolerance (PBFT) that implement a vote system to reach consensus inside a distributed network, rather than calculate a computationally intense puzzle [3].…”
Section: Introductionmentioning
confidence: 99%