skip to main content
survey

Leveraging User-related Internet of Things for Continuous Authentication: A Survey

Published:18 June 2019Publication History
Skip Abstract Section

Abstract

Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging these user-related IoT elements, it is possible to ensure the identity of the user for a period of time, thus avoiding impersonation. This need is known as Continuous Authentication (CA). Since 2009, a plethora of IoT-based CA academic research and industrial contributions have been proposed. We offer a comprehensive overview of 58 research papers regarding the main components of such a CA system. The status of the industry is studied as well, covering 32 market contributions, research projects, and related standards. Lessons learned, challenges, and open issues to foster further research in this area are finally presented.

Skip Supplemental Material Section

Supplemental Material

References

  1. ISO/IEC 17922. 2017. Security techniques—Telebiometric authentication framework using biometric hardware security module. Retrieved from https://www.iso.org/standard/61023.html.Google ScholarGoogle Scholar
  2. Sixth Framework Programme (FP6). STREP Specific Targeted Research Project 2006--2008. {n.d.}. HUMABIO (HUman Monitoring and Authentication using Biodynamic Indicators and behaviOural Analysis). Retrieved from http://www.humabio-eu.org/.Google ScholarGoogle Scholar
  3. Seventh Framework Programme (FP7). ERC-SG ERC Starting Grant 2013--2017. {n.d.}. Pico: No more passwords. Retrieved from http://mypico.org/.Google ScholarGoogle Scholar
  4. National Science Foundation (NSF) 2015--2018. {n.d.}. Spoof-Resistant Smartphone Authentication using Cooperating Wearables. Retrieved from https://www.nsf.gov/awardsearch/showAward?AWD_ID=1527795&HistoricalAwards===false.Google ScholarGoogle Scholar
  5. National Science Foundation (NSF) 2016--2019. {n.d.}. Continuous Human-User Authentication by Induced Procedural Visual-Motor Biometrics. Retrieved from https://nsf.gov/awardsearch/showAward?AWD_ID=1718116&HistoricalAwards===false.Google ScholarGoogle Scholar
  6. Horizon 2020 Innovation Framework Programme. MSCA-ITN-ETN European Training Networks 2017--2020. {n.d.}. AMBER—EnhAnced Mobile BiomEtRics. Retrieved from https://www.amber-biometrics.eu/.Google ScholarGoogle Scholar
  7. National Science Foundation (NSF) 2017--2020. {n.d.}. Cardiac Password: Exploring a Non-Contact and Continuous Approach to Secure User Authentication. Retrieved from https://www.nsf.gov/awardsearch/showAward?AWD_ID=17184838HistoricalAwards=false.Google ScholarGoogle Scholar
  8. National Science Foundation (NSF) 2017--2020. {n.d.}. Implicit One-handed Mobile User Authentication by Induced Thumb Biometrics on Touch-screen Handheld Devices. Retrieved from https://www.nsf.gov/awardsearch/showAward?AWD_ID=17048008HistoricalAwards=false.Google ScholarGoogle Scholar
  9. ISO/IEC 29115. 2013. Security techniques—Entity authentication assurance framework. Retrieved from https://www.iso.org/standard/45138.html.Google ScholarGoogle Scholar
  10. ISO/IEC 9798-1. 2010. Entity authentication—Part 1: General. Retrieved from https://www.iso.org/standard/53634.html.Google ScholarGoogle Scholar
  11. ISO/IEC 9798-2. 2008. Entity authentication—Part 2: Mechanisms using symmetric encipherment algorithms. Retrieved from https://www.iso.org/standard/50522.html.Google ScholarGoogle Scholar
  12. ISO/IEC 9798-3. 2017. Entity authentication—Part 3: Mechanisms using digital signature techniques. Retrieved from https://www.iso.org/standard/67115.html.Google ScholarGoogle Scholar
  13. ISO/IEC 9798-4. 1999. Entity authentication—Part 4: Mechanisms using a cryptographic check function. Retrieved from https://www.iso.org/standard/31488.html.Google ScholarGoogle Scholar
  14. ISO/IEC 9798-5. 2009. Entity authentication—Part 5: Mechanisms using zero-knowledge techniques. Retrieved from https://www.iso.org/standard/50456.html.Google ScholarGoogle Scholar
  15. A. Acar, H. Aksu, A. S. Uluagac, and K. Akkaya. 2018. WACA: Wearable-assisted continuous authentication. In Proceedings of the IEEE Security and Privacy Workshops (SPW’18). 264--269.Google ScholarGoogle Scholar
  16. Acceptto. {n.d.}. First Cognitive Continuous Authentication. Retrieved from https://www.acceptto.com/continuous-authentication.html.Google ScholarGoogle Scholar
  17. Horizon 2020 Innovation Framework Programme. Innovation action 2015--2017. {n.d.}. Face and body Analysis Natural Computer Interaction (FANCI). Retrieved from http://cordis.europa.eu/project/rcn/85410_en.html.Google ScholarGoogle Scholar
  18. Aetna. {n.d.}. Next Generation Authentication. Retrieved from https://news.aetna.com/2017/08/aetnas-next-generation-authentication/.Google ScholarGoogle Scholar
  19. Ahmed Awad E. Ahmed and Issa Traoré. 2012. Performance metrics and models for continuous authentication systems. In Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, 23--39.Google ScholarGoogle Scholar
  20. aimbrain. {n.d.}. Improve your user experience with continuous authentication. Retrieved from https://aimbrain.com/step-up-authentication-process/.Google ScholarGoogle Scholar
  21. Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christoph Reich. 2015. A survey of continuous and transparent multibiometric authentication systems. In Proceedings of the 14th European Conference on Cyber Warfare and Security. 1--10.Google ScholarGoogle Scholar
  22. Abdulwahid Al Abdulwahid, Nathan Clarke, Ingo Stengel, Steven Furnell, and Christoph Reich. 2016. Continuous and transparent multimodal authentication: Reviewing the state of the art. Cluster Comput. 19, 1 (2016), 455--474. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tutor. 17, 4 (2015), 2347--2376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Fadele Ayotunde Alaba, Mazliza Othman, Ibrahim Abaker Targio Hashem, and Faiz Alotaibi. 2017. Internet of things security: A survey. J. Netw. Comput. Appl. 88 (2017), 10--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. J. Info. Secur. Appl. 38 (2018), 8--27.Google ScholarGoogle ScholarCross RefCross Ref
  26. Intensity analytics. {n.d.}. TickStream.CV. Retrieved from http://intensityanalytics.com/products/tickstream.cv.aspx.Google ScholarGoogle Scholar
  27. Android. {n.d.}. Sensors Overview (Android developers). Retrieved from https://developer.android.com/guide/topics/sensors/sensors_overview.html.Google ScholarGoogle Scholar
  28. Fazel Anjomshoa, Moayad Aloqaily, Burak Kantarci, Melike Erol-Kantarci, and Stephanie Schuckers. 2017. Social behaviometrics for personalized devices in the internet of things era. IEEE Access 5 (2017), 12199--12213.Google ScholarGoogle ScholarCross RefCross Ref
  29. Juan Sebastian Arteaga-Falconi, Hussein Al Osman, and Abdulmotaleb El Saddik. 2016. ECG authentication for mobile devices. IEEE Trans. Instrument. Measure. 65, 3 (2016), 591--600.Google ScholarGoogle ScholarCross RefCross Ref
  30. Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Comput. Netw. 54, 15 (2010), 2787--2805. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Shu-Di Bao, Yuan-Ting Zhang, and Lian-Feng Shen. 2005. Physiological signal-based entity authentication for body area sensor networks and mobile healthcare systems. In Proceedings of the IEEE 27th Annual International Conference of the Engineering in Medicine and Biology Society (EMBS’05). IEEE, 2455--2458.Google ScholarGoogle Scholar
  32. BEAT4KEY. {n.d.}. Embedded biometrics. Retrieved from http://www.beat4key.com/products/.Google ScholarGoogle Scholar
  33. BehavioSec. {n.d.}. Continuous Authentication with Passive Behavioral Biometrics. Retrieved from https://www.behaviosec.com/.Google ScholarGoogle Scholar
  34. Albert Bifet and Richard Kirkby. 2009. Data stream mining a practical approach. University of WAIKATO, Centre for Open Software Innovation.Google ScholarGoogle Scholar
  35. Biocatch. {n.d.}. Less friction. Less fraud. Retrieved from https://www.biocatch.com/.Google ScholarGoogle Scholar
  36. Bitwoke. {n.d.}. Secure A. I.-based edge analytics powering smart connected devices. Retrieved from https://www.bitwoke.com/.Google ScholarGoogle Scholar
  37. Angelo Bonissi, Ruggero Donida Labati, Luca Perico, Roberto Sassi, Fabio Scotti, and Luca Sparagino. 2013. A preliminary study on continuous authentication methods for photoplethysmographic biometrics. In Proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS’13). IEEE, 28--33.Google ScholarGoogle ScholarCross RefCross Ref
  38. Tuhin Borgohain, Uday Kumar, and Sugata Sanyal. 2015. Survey of security and privacy issues of Internet of Things. arXiv preprint arXiv:1501.02211.Google ScholarGoogle Scholar
  39. Leo Breiman. 1996. Bagging predictors. Machine Learn. 24, 2 (1996), 123--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. David Brown, William Pase, Chris McKenzie, Mazda Salmanian, and Helen Tang. 2017. A prototype implementation of continuous authentication for tactical applications. In Ad Hoc Networks. Springer, 342--353.Google ScholarGoogle Scholar
  41. Arun Balaji Buduru and Stephen S. Yau. 2015. An effective approach to continuous user authentication for touch screen smart devices. In Software Quality, Reliability and Security (QRS), 2015 IEEE International Conference on. IEEE, 219--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Carmen Camara, Pedro Peris-Lopez, Lorena Gonzalez-Manzano, and Juan Tapiador. 2018. Real-time electrocardiogram streams for continuous authentication. Appl. Soft Comput. 68 (2018), 784--794.Google ScholarGoogle ScholarCross RefCross Ref
  43. Carmen Camara, Pedro Peris-Lopez, and Juan E. Tapiador. 2015. Security and privacy issues in implantable medical devices: A comprehensive survey. J. Biomed. Informat. 55 (2015), 272--289. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, and Corrado Aaron Visaggio. 2016. Silent and continuous authentication in mobile environment. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’16). 97--108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Mario Parreño Centeno, Yu Guan, and Aad van Moorsel. 2018. Mobile-based continuous authentication using deep features. In Proceedings of the 2nd International Workshop on Embedded and Mobile Deep Learning. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. PEW Research Center. {n.d.}. Mobile Fact Sheet. Retrieved from http://www.pewinternet.org/fact-sheet/mobile/.Google ScholarGoogle Scholar
  47. Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, and Mohamed Ali Kaafar. 2016. Gesture-based continuous authentication for wearable devices: The smart glasses use case. In Proceedings of the International Conference on Applied Cryptography and Network Security. Springer, 648--665.Google ScholarGoogle ScholarCross RefCross Ref
  48. Roger Clarke. 1994. Human identification in information systems: Management challenges and public policy issues. Info. Technol. People 7, 4 (1994), 6--37.Google ScholarGoogle ScholarCross RefCross Ref
  49. Lorrie Faith Cranor and Norbou Buchler. 2014. Better together: Usability and security go hand in hand. IEEE Secur. Privacy 12, 6 (2014), 89--93.Google ScholarGoogle ScholarCross RefCross Ref
  50. Heather Crawford, Karen Renaud, and Tim Storer. 2013. A framework for continuous, transparent mobile device authentication. Comput. Secur. 39 (2013), 127--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. David Crouse, Hu Han, Deepak Chandra, Brandon Barbello, and Anil K. Jain. 2015. Continuous authentication of mobile user: Fusion of face image and inertial measurement unit data. In Proceedings of the International Conference on Biometrics (ICB’15). IEEE, 135--142.Google ScholarGoogle Scholar
  52. Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Info. 10, 4 (2014), 2233--2243.Google ScholarGoogle ScholarCross RefCross Ref
  53. Jessamyn Dahmen, Diane J. Cook, Xiaobo Wang, and Wang Honglei. 2017. Smart secure homes: A survey of smart home technologies that sense, assess, and respond to security threats. J. Reliable Intell. Environ. (2017), 1--16.Google ScholarGoogle Scholar
  54. Daon. {n.d.}. Join our ecosystem. Retrieved from https://www.daon.com/company/join-our-ecosystem.Google ScholarGoogle Scholar
  55. Manik Lal Das, Ashutosh Saxena, and Ved P. Gulati. 2004. A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50, 2 (2004), 629--631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jose Maria de Fuentes, Lorena Gonzalez-Manzano, and Arturo Ribagorda. 2018. Secure and usable user-in-a-context continuous authentication in smartphones leveraging non-assisted sensors. Sensors 18, 4 (2018), 1219.Google ScholarGoogle ScholarCross RefCross Ref
  57. Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch me once and i know it’s you! Implicit authentication based on touch screen patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 987--996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Michael P. Down and R. J. Sands. 2004. Biometrics: An overview of the technology, challenges and control considerations. Info. Syst. Control J. 4 (2004), 53--56.Google ScholarGoogle Scholar
  59. Sergio Roberto de Lima e Silva, Mauro Roisenberg et al. 2006. Continuous authentication by keystroke dynamics using committee machines. In Proceedings of the International Conference on Intelligence and Security Informatics. Springer, 686--687. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Muhammad Ehatisham-ul Haq, Muhammad Awais Azam, Usman Naeem, Yasar Amin, and Jonathan Loo. 2018. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing. J. Netw. Comput. Appl. 109 (2018), 24--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Saad El Jaouhari, Ahmed Bouabdallah, Jean-Marie Bonnin, and Tayeb Lemlouma. 2017. Toward a smart health-care architecture using WebRTC and WoT. In Proceedings of the World Conference on Information Systems and Technologies. Springer, 531--540.Google ScholarGoogle ScholarCross RefCross Ref
  62. Mehdia Ajana El Khaddar and Mohammed Boulmalf. 2017. Smartphone: The ultimate IoT and IoE device. In Smartphones from an Applied Research Perspective. InTech.Google ScholarGoogle Scholar
  63. Arihito Endo, Takeo Shibata, and Hiroshi Tanaka. 2008. Comparison of seven algorithms to predict breast cancer survival. Int. J. Biomed. Soft Comput. Hum. Sci.: Official J. Biomed. Fuzzy Syst. Assoc. 13, 2 (2008), 11--16.Google ScholarGoogle Scholar
  64. Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’96), Vol. 96. 226--231.Google ScholarGoogle Scholar
  65. Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recogn. Lett. 27, 8 (2006), 861--874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Huan Feng, Kassem Fawaz, and Kang G Shin. 2017. Continuous authentication for voice assistants. arXiv preprint arXiv:1701.04507.Google ScholarGoogle Scholar
  67. Tao Feng, Ziyi Liu, Kyeong-An Kwon, Weidong Shi, Bogdan Carbunar, Yifei Jiang, and Nhung Nguyen. 2012. Continuous mobile authentication using touchscreen gestures. In Proceedings of the IEEE Conference on Technologies for Homeland Security (HST’12). IEEE, 451--456.Google ScholarGoogle ScholarCross RefCross Ref
  68. Tao Feng, Xi Zhao, Bogdan Carbunar, and Weidong Shi. 2013. Continuous mobile authentication using virtual key typing biometrics. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13). IEEE, 1547--1552.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2013. Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Info. Forensics Secur. 8, 1 (2013), 136--148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Yoav Freund, Robert E. Schapire et al. 1996. Experiments with a new boosting algorithm. In Icml, Vol. 96. 148--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Lex Fridman, Steven Weber, Rachel Greenstadt, and Moshe Kam. 2016. Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11, 2 (2016), 513--521.Google ScholarGoogle ScholarCross RefCross Ref
  72. Nir Friedman, Dan Geiger, and Moises Goldszmidt. 1997. Bayesian network classifiers. Mach. Learn. 29, 2--3 (1997), 131--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. fusionpipe. {n.d.}. Optiimize end user convenience without copromising security. Retrieved from https://fusionpipe.com/quikid.Google ScholarGoogle Scholar
  74. Futurae. {n.d.}. Authentication Suite. Retrieved from https://futurae.com/product/.Google ScholarGoogle Scholar
  75. Hugo Gascon, Sebastian Uellenbeck, Christopher Wolf, and Konrad Rieck. 2014. Continuous authentication on mobile devices by analysis of typing motion behavior. In Proceedings of the Graphics Interface Conference “Sicherheit” (GI’14). 1--12.Google ScholarGoogle Scholar
  76. Ammar Gharaibeh, Mohammad A Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, and Ala Al-Fuqaha. 2017. Smart cities: A survey on data management, security, and enabling technologies. IEEE Commun. Surveys Tutor. 19, 4 (2017), 2456--2501.Google ScholarGoogle ScholarCross RefCross Ref
  77. IDEE GmbH. {n.d.}. There is only one you. Retrieved from https://getidee.com/.Google ScholarGoogle Scholar
  78. Cyril Goutte and Eric Gaussier. 2005. A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In Proceedings of the European Conference on Information Retrieval (ECIR’05), Vol. 5. Springer, 345--359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Sathya Govindarajan, Paolo Gasti, and Kiran S Balagani. 2013. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS’13). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  80. Jorge Granjal, Edmundo Monteiro, and Jorge Sá Silva. 2015. Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surveys Tutor. 17, 3 (2015), 1294--1312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gen. Comput. Syst. 29, 7 (2013), 1645--1660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Mouhcine Guennoun, Najoua Abbad, Jonas Talom, Sk Md Mizanur Rahman, and Khalil El-Khatib. 2009. Continuous authentication by electrocardiogram data. In Proceedings of the IEEE Toronto International Conference on Science and Technology for Humanity (TIC-STH’09). IEEE, 40--42.Google ScholarGoogle ScholarCross RefCross Ref
  83. Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. A novel authentication framework based on bio-metric and radio fingerprinting for the IoT in eHealth. In Proceedings of International Conference on Smart Systems, Devices and Technologies (SMART’14). 32--37.Google ScholarGoogle Scholar
  84. Christian Holz and Marius Knaust. 2015. Biometric touch sensing: Seamlessly augmenting each touch with continuous authentication. In Proceedings of the 28th Annual ACM Symposium on User Interface Software 8 Technology. ACM, 303--312.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Md Mahmud Hossain, Maziar Fotouhi, and Ragib Hasan. 2015. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Proceedings of the IEEE World Congress on Services (SERVICES’15). IEEE, 21--28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Vincent C. Hu, David Ferraiolo, Rick Kuhn, Arthur R. Friedman, Alan J. Lang, Margaret M. Cogdell, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone et al. 2013. Guide to attribute-based access control (ABAC) definition and considerations (draft). NIST Spec. Publicat. 800, 162 (2013).Google ScholarGoogle Scholar
  87. Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, and J. D. Tygar. 2011. Adversarial machine learning. In Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence. ACM, 43--58.Google ScholarGoogle Scholar
  88. Peter J. Huber. 1967. The behavior of maximum likelihood estimates under nonstandard conditions. In Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1. Berkeley, CA, 221--233.Google ScholarGoogle Scholar
  89. SCB Intelligence. 2008. Six technologies with potential impacts on U.S. interests out to 2025. Technical report, National Intelligence Council.Google ScholarGoogle Scholar
  90. InterDigital. {n.d.}. idNSure. Retrieved from http://www.interdigital.com/solution/idnsure.Google ScholarGoogle Scholar
  91. Lijun Jiang and Weizhi Meng. 2017. Smartphone user authentication using touch dynamics in the big data era: Challenges and opportunities. In Biometric Security and Privacy. Springer, 163--178.Google ScholarGoogle Scholar
  92. Biing-Hwang Juang, Wu Hou, and Chin-Hui Lee. 1997. Minimum classification error rate methods for speech recognition. IEEE Trans. Speech Audio Process. 5, 3 (1997), 257--265.Google ScholarGoogle ScholarCross RefCross Ref
  93. Eugenijus Kaniusas. 2012. Fundamentals of biosignals. In Biomedical Signals and Sensors I. Springer, 1--26.Google ScholarGoogle Scholar
  94. Sevasti Karatzouni. 2013. Non-intrusive continuous user authentication for mobile devices. PhD Thesis. University of Plymouth.Google ScholarGoogle Scholar
  95. Apostolos Katidiotis, Kostas Tsagkaris, and Panagiotis Demestichas. 2010. Performance evaluation of artificial neural network-based learning schemes for cognitive radio systems. Comput. Electric. Engineer. 36, 3 (2010), 518--535. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. James M. Keller, Michael R. Gray, and James A. Givens. 1985. A fuzzy k-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybernet. 4 (1985), 580--585.Google ScholarGoogle ScholarCross RefCross Ref
  97. KeyLemon. {n.d.}. Oasis Faces. Mobile banking. Retrieved from https://www.keylemon.com/.Google ScholarGoogle Scholar
  98. Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, and Shahid Khan. 2012. Future internet: The internet of things architecture, possible applications and key challenges. In Proceedings of the 10th International Conference on Frontiers of Information Technology (FIT’12). IEEE, 257--260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Kalevi Kilkki, Martti Mäntylä, Kimmo Karhu, Heikki Hämmäinen, and Heikki Ailisto. 2018. A disruption framework. Technol. Forecast. Soc. Change 129 (2018), 275--284.Google ScholarGoogle ScholarCross RefCross Ref
  100. Jaeho Kim and Jang-Won Lee. 2014. OpenIoT: An open service framework for the Internet of Things. In Proceedings of the IEEE World Forum on Internet of Things (WF-IoT’14). IEEE, 89--93.Google ScholarGoogle ScholarCross RefCross Ref
  101. Carl Kingsford and Steven L. Salzberg. 2008. What are decision trees?Nature Biotechnol. 26, 9 (2008), 1011--1013.Google ScholarGoogle Scholar
  102. Andrew J. Klosterman and Gregory R. Ganger. 2000. Secure Continuous Biometric-Enhanced Authentication. Technical report, Department of Computer Science, Carnegie-Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  103. kryptowire. {n.d.}. Continuous Authentication. Retrieved from https://www.kryptowire.com/continuous-authentication.php.Google ScholarGoogle Scholar
  104. Rajesh Kumar, Vir V. Phoha, and Abdul Serwadda. 2016. Continuous authentication of smartphone users by fusing typing, swiping, and phone movement patterns. In Proceedings of the IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS’16). IEEE, 1--8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Ruggero Donida Labati, Roberto Sassi, and Fabio Scotti. 2013. ECG biometric recognition: Permanence analysis of QRS signals for 24 hours continuous authentication. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS’13). IEEE, 31--36.Google ScholarGoogle ScholarCross RefCross Ref
  106. Wei-Han Lee and Ruby B. Lee. 2017. Implicit smartphone user authentication with sensors and contextual machine learning. In Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’17). IEEE, 297--308.Google ScholarGoogle Scholar
  107. K. Ming Leung. 2007. Naive Bayesian classifier. Technical report, Department of Computer Science/Finance and Risk Engineering, Polytechnic University.Google ScholarGoogle Scholar
  108. Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland. 2011. Behaviour profiling for transparent authentication for mobile devices. In Proceedings of the European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 307.Google ScholarGoogle Scholar
  109. Shancang Li and Li Da Xu. 2017. Securing the Internet of Things. Syngress.Google ScholarGoogle Scholar
  110. Shancang Li, Li Da Xu, and Shanshan Zhao. 2018. 5G internet of things: A survey. J. Industr. Info. Integration 10 (2018), 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  111. Yantao Li, Hailong Hu, and Gang Zhou. 2019. Using data augmentation in continuous authentication on smartphones. IEEE Internet Things J. 6, 1 (2019), 628--640.Google ScholarGoogle ScholarCross RefCross Ref
  112. Yantao Li, Hailong Hu, Gang Zhou, and Shaojiang Deng. 2018. Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6 (2018), 32554--35565.Google ScholarGoogle ScholarCross RefCross Ref
  113. Fei Liu, Chee-Wee Tan, Eric TK Lim, and Ben Choi. 2017. Traversing knowledge networks: An algorithmic historiography of extant literature on the Internet of Things (IoT). J. Manage. Analyt. 4, 1 (2017), 3--34.Google ScholarGoogle ScholarCross RefCross Ref
  114. Wael Louis, Majid Komeili, and Dimitrios Hatzinakos. 2016. Continuous authentication using one-dimensional multi-resolution local binary patterns (1DMRLBP) in ECG biometrics. IEEE Trans. Info. Forensics Secur. 11, 12 (2016), 2818--2832. Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. David MacKay. 2003. An example inference task: Clustering. Info. Theory, Infer. Learn. Algor. 20 (2003), 284--292.Google ScholarGoogle Scholar
  116. Upal Mahbub, Vishal M. Patel, Deepak Chandra, Brandon Barbello, and Rama Chellappa. 2016. Partial face detection for continuous authentication. In Proceedings of the IEEE International Conference on Image Processing (ICIP’16). IEEE, 2991--2995.Google ScholarGoogle ScholarCross RefCross Ref
  117. Yasuo Matsuyama, Michitaro Shozawa, and Ryota Yokote. 2015. Brain signal’s low-frequency fits the continuous authentication. Neurocomputing 164 (2015), 137--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Carlo Maria Medaglia and Alexandru Serbanati. 2010. An overview of privacy and security issues in the internet of things. In The Internet of Things. Springer, 389--395.Google ScholarGoogle Scholar
  119. Diego M. Mendez, Ioannis Papapanagiotou, and Baijian Yang. 2017. Internet of things: Survey on security and privacy. arXiv preprint arXiv:1707.01879.Google ScholarGoogle Scholar
  120. Michael Miller. 2015. The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities are Changing the World. Pearson Education.Google ScholarGoogle Scholar
  121. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10, 7 (2012), 1497--1516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Soumik Mondal and Patrick Bours. 2015. Continuous authentication and identification for mobile devices: Combining security and forensics. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS’15). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  123. Arsalan Mosenia, Susmita Sur-Kolay, Anand Raghunathan, and Niraj K. Jha. 2017. CABA: Continuous authentication based on BioAura. IEEE Trans. Comput. 66, 5 (2017), 759--772. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Tamalika Mukherjee. 2017. An Approach to Software Development for Continuous Authentication of Smart Wearable Device Users. Ph.D. Dissertation. Arizona State University.Google ScholarGoogle Scholar
  125. Rahul Murmuria, Angelos Stavrou, Daniel Barbará, and Dan Fleck. 2015. Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection. Springer, 405--424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Isao Nakanishi, Sadanao Baba, Koutaro Ozaki, and Shigang Li. 2013. Using brain waves as transparent biometrics for on-demand driver authentication. Int. J. Biometr. 5, 3--4 (2013), 288--305.Google ScholarGoogle ScholarCross RefCross Ref
  127. Tempestt J. Neal, Damon L. Woodard, and Aaron D. Striegel. 2015. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits. In Proceedings of the IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS’15). IEEE, 1--6.Google ScholarGoogle Scholar
  128. OLEA Sensor Networks. {n.d.}. Olea HeartSignature. Retrieved from http://www.oleasys.com/heartsignature.Google ScholarGoogle Scholar
  129. B. Clifford Neuman and Theodore Ts’o. 1994. Kerberos: An authentication service for computer networks. IEEE Commun. Mag. 32, 9 (1994), 33--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. NoPassword. {n.d.}. Authentication. Retrieved from https://www2.nopassword.com/authentication/.Google ScholarGoogle Scholar
  131. Symantec Norton. {n.d.}. What is The Internet of Things (IoT)? Retrieved from https://us.norton.com/internetsecurity-iot.html.Google ScholarGoogle Scholar
  132. nymi. {n.d.}. The nymi ecosystem. Retrieved from https://downloads.nymi.com/sdkDoc/doc-v3.1.5.326-326_5df03a4/index.html#introduction.Google ScholarGoogle Scholar
  133. Mahamed G. H. Omran, Andries P. Engelbrecht, and Ayed Salman. 2007. An overview of clustering methods. Intell. Data Anal. 11, 6 (2007), 583--605. Google ScholarGoogle ScholarCross RefCross Ref
  134. Mahesh Pal. 2005. Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26, 1 (2005), 217--222.Google ScholarGoogle ScholarCross RefCross Ref
  135. Krupal S. Parikh and Trupti P. Shah. 2016. Support vector machine—A large margin classifier to diagnose skin illnesses. Procedia Technol. 23 (2016), 369--375.Google ScholarGoogle ScholarCross RefCross Ref
  136. Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello. 2016. Continuous user authentication on mobile devices: Recent progress and remaining challenges. IEEE Signal Process. Mag. 33, 4 (2016), 49--61.Google ScholarGoogle ScholarCross RefCross Ref
  137. Eleven Paths. {n.d.}. Centralized Access Control Solution. Retrieved from https://www.elevenpaths.com/solutions/smart-web-access/index.html.Google ScholarGoogle Scholar
  138. Ge Peng, Gang Zhou, David T Nguyen, Xin Qi, Qing Yang, and Shuangquan Wang. 2017. Continuous authentication with touch behavioral biometrics and voice on wearable glasses. IEEE Trans. Hum.-Mach. Syst. 47, 3 (2017), 404--416.Google ScholarGoogle ScholarCross RefCross Ref
  139. Duong-Tien Phan, Nhan Nguyen-Trong Dam, Minh-Phuc Nguyen, Minh-Triet Tran, and Toan-Thinh Truong. 2015. Smart kiosk with gait-based continuous authentication. In Proceedings of the International Conference on Distributed, Ambient, and Pervasive Interactions. Springer, 188--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Plurilock. {n.d.}. Continuous proof of presence. Retrieved from https://www.plurilock.com/.Google ScholarGoogle Scholar
  141. David Martin Powers. 2011. Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation. Journal of Machine Learning Technologies 2, 1 (2011), 37--63.Google ScholarGoogle ScholarCross RefCross Ref
  142. Uthpala Subodhani Premarathne. 2015. Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes. Energy 93 (2015), 1210--1221.Google ScholarGoogle ScholarCross RefCross Ref
  143. Davy Preuveneers and Wouter Joosen. 2015. SmartAuth: Dynamic context fingerprinting for continuous user authentication. In Proceedings of the 30th Annual ACM Symposium on Applied Computing. ACM, 2185--2191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. Davy Preuveneers, Wouter Joosen et al. 2017. Improving resilience of behaviometric-based continuous authentication with multiple accelerometers. In Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 473--485.Google ScholarGoogle Scholar
  145. Seventh Framework Programme (FP7). Collaborative project 2008--2011. {n.d.}. Unobtrusive authentication using activity related and soft biometrics (ACTIBIO). Retrieved from http://cordis.europa.eu/project/rcn/85410_en.html.Google ScholarGoogle Scholar
  146. Qualcomm. {n.d.}. Security and privacy vision. Retrieved from https://www.qualcomm.com/invention/cognitive-technologies/security-privacy-vision.Google ScholarGoogle Scholar
  147. Carl Edward Rasmussen. 2000. The infinite Gaussian mixture model. In Advances in Neural Information Processing Systems. MIT Press, 554--560. Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Andreas Riener. 2012. Sitting postures and electrocardiograms: A method for continuous and non-disruptive driver authentication. In Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, 137--168.Google ScholarGoogle Scholar
  149. Rosslin John Robles and Tai-hoon Kim. 2010. Applications, systems and methods in smart home technology: A. Int. J. Adv. Sci. Technol. 15 (2010).Google ScholarGoogle Scholar
  150. Rodrigo Roman, Jianying Zhou, and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 10 (2013), 2266--2279.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Aditi Roy, Tzipora Halevi, and Nasir Memon. 2015. An HMM-based multi-sensor approach for continuous mobile authentication. In Proceedings of the Military Communications Conference (MILCOM’15). IEEE, 1311--1316.Google ScholarGoogle ScholarCross RefCross Ref
  152. Ahmad-Reza Sadeghi, Christian Wachsmann, and Michael Waidner. 2015. Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd ACM/EDAC/IEEE Design Automation Conference (DAC’15). IEEE, 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. Hataichanok Saevanee, Nathan Clarke, Steven Furnell, and Valerio Biscione. 2014. Text-based active authentication for mobile devices. In Proceedings of the IFIP International Information Security Conference. Springer, 99--112.Google ScholarGoogle ScholarCross RefCross Ref
  154. Pouya Samangouei, Vishal M. Patel, and Rama Chellappa. 2015. Attribute-based continuous user authentication on mobile devices. In Proceedings of the IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS’15). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  155. Kim B. Schaffer. 2015. Expanding continuous authentication with mobile devices. Computer 48, 11 (2015), 92--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Robert E. Schapire. 2013. Explaining adaboost. In Empirical Inference. Springer, 37--52.Google ScholarGoogle Scholar
  157. Bernhard Schölkopf. 2001. The kernel trick for distances. In Advances in Neural Information Processing Systems. MIT Press, 301--307.Google ScholarGoogle Scholar
  158. Secureauth. {n.d.}. Go Beyond Two-Factor Authentication. Retrieved from https://www.secureauth.com/.Google ScholarGoogle Scholar
  159. securedtouch. {n.d.}. Behevioral biometrics. Retrieved from https://securedtouch.com/behavioral-biometrics/.Google ScholarGoogle Scholar
  160. IBM security. 2018. Future of identity study. https://www.ibm.com/downloads/cas/QRBY08NO.Google ScholarGoogle Scholar
  161. SensibleVision. {n.d.}. Innovation for real-world users. Retrieved from http://www.sensiblevision.com/en-us/about/aboutus.aspx.Google ScholarGoogle Scholar
  162. Hossein Shafagh, Anwar Hithnawi, and Simon Duquennoy. 2017. Towards blockchain-based auditable storage and sharing of IoT data. arXiv preprint arXiv:1705.08230.Google ScholarGoogle Scholar
  163. Muhammad Shahzad and Munindar P. Singh. 2017. Continuous authentication and authorization for the Internet of Things. IEEE Internet Comput. 21, 2 (2017), 86--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Chao Shen, Yong Zhang, Zhongmin Cai, Tianwen Yu, and Xiaohong Guan. 2015. Touch-interaction behavior for continuous user authentication on smartphones. In Proceedings of the International Conference on Biometrics (ICB’15). IEEE, 157--162.Google ScholarGoogle ScholarCross RefCross Ref
  165. S. J. Shepherd. 1995. Continuous authentication by analysis of keyboard typing characteristics. In Proceedings of Conference European Convention on Security and Detection. 111--114.Google ScholarGoogle ScholarCross RefCross Ref
  166. Weidong Shi, Jun Yang, Yifei Jiang, Feng Yang, and Yingen Xiong. 2011. Senguard: Passive user identification on smartphones using multiple sensors. In Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’11). IEEE, 141--148.Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. Terence Sim, Sheng Zhang, Rajkumar Janakiraman, and Sandeep Kumar. 2007. Continuous verification using multimodal biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29, 4 (2007), 687--700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. Zdeňka Sitová, Jaroslav Šeděnka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S. Balagani. 2016. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Trans. Info. Forensics Secur. 11, 5 (2016), 877--892.Google ScholarGoogle ScholarDigital LibraryDigital Library
  169. softserve. {n.d.}. Meet biolock: smart biometrics for tomorrow. Retrieved from https://www.softserveinc.com/en-us/tech/blogs/biolock-smart-identity-authentication/.Google ScholarGoogle Scholar
  170. Agusti Solanas, Constantinos Patsakis, Mauro Conti, Ioannis S. Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A. Pérez-Martínez, Roberto Di Pietro, Despina N. Perrea et al. 2014. Smart health: A context-aware health paradigm within smart cities. IEEE Commun. Mag. 52, 8 (2014), 74--81.Google ScholarGoogle ScholarCross RefCross Ref
  171. Chen Song, Feng Lin, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac scan: A non-contact and continuous heart-based user authentication system. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, 315--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Ioannis C. Stylios, Olga Thanou, Iosif Androulidakis, and Elena Zaitseva. 2016. A review of continuous authentication using behavioral biometrics. In Proceedings of the SouthEast European Design Automation, Computer Engineering, Computer Networks and Social Media Conference. ACM, 72--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Hui Suo, Jiafu Wan, Caifeng Zou, and Jianqi Liu. 2012. Security in the internet of things: A review. In Proceedings of the International Conference on Computer Science and Electronics Engineering (ICCSEE’12), vol. 3. IEEE, 648--651.Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. Symantec. {n.d.}. Consumer Multi-Factor Authentication Solutions. Retrieved from https://www.symantec.com/theme/multi-factor-authentication-solutions.Google ScholarGoogle Scholar
  175. Pang-Ning Tan, Michael Steinbach, Vipin Kumar et al. 2006. Cluster analysis: Basic concepts and algorithms. Intro. Data Min. 8 (2006), 487--568.Google ScholarGoogle Scholar
  176. Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, and Ke Chen. 2016. A survey on touch dynamics authentication in mobile devices. Comput. Secur. 59 (2016), 210--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. TeleSign. {n.d.}. TeleSign targets account takeover fraud with behavioral biometrics technology. Retrieved from https://www.telesign.com/blog/post/telesign-targets-account-takeover-fraud-with-behavioral-biometrics-technology/.Google ScholarGoogle Scholar
  178. Marlies Temper, Simon Tjoa, and Manfred Kaiser. 2015. Touch to authenticate—Continuous biometric authentication on mobile devices. In Proceedings of the International Conference on Software Security and Assurance (ICSSA’15). IEEE, 30--35.Google ScholarGoogle ScholarCross RefCross Ref
  179. ThisData. {n.d.}. Use our security APIs to make risk-based decisions in your applications. Retrieved from https://thisdata.com/.Google ScholarGoogle Scholar
  180. Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS8P’17). IEEE, 3--18.Google ScholarGoogle ScholarCross RefCross Ref
  181. typingdna. {n.d.}. Typing biometrics authentication API based on keystroke dynamics. Retrieved from https://www.typingdna.com/authentication-api.html.Google ScholarGoogle Scholar
  182. ISO/IEC 24761 (under review). 2009. Security techniques—Authentication context for biometrics. Retrieved from https://www.iso.org/standard/41531.html.Google ScholarGoogle Scholar
  183. UnifyID. {n.d.}. Join our team. Retrieved from https://unify.id/desginer-application.html.Google ScholarGoogle Scholar
  184. vasco. {n.d.}. Behevioral biometrics. Retrieved from https://www.vasco.com/products/application-security/behavioral-authentication.html.Google ScholarGoogle Scholar
  185. Veridium. {n.d.}. Behavioral Biometrics: Continuous Authentication. Retrieved from https://www.veridiumid.com/blog/behavioral-biometrics-continuous-authentication/.Google ScholarGoogle Scholar
  186. Ovidiu Vermesan, Markus Eisenhauer, H. Sunmaeker, Patrick Guillemin, Martin Serrano, Elias Z. Tragos, Javier Valino, A. van der Wees, A. Gluhak, and R. Bahr. 2017. Internet of Things cognitive transformation technology research trends and applications. Cognitive Hyperconnected Digital Transformation, O. Vermesan and J. Bacquet (Eds.). River Publishers, 17--95.Google ScholarGoogle Scholar
  187. Yuji Watanabe, Tsutomu Fujita et al. 2013. Toward introduction of immunity-based model to continuous behavior-based user authentication on smart phone. Procedia Comput. Sci. 22 (2013), 1319--1327.Google ScholarGoogle ScholarCross RefCross Ref
  188. Ian H. Witten, Eibe Frank, Mark A. Hall, and Christopher J. Pal. 2016. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann. Google ScholarGoogle ScholarDigital LibraryDigital Library
  189. Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, and Te-En Wei. 2015. Smartphone continuous authentication based on keystroke and gesture profiling. In Proceedings of the International Carnahan Conference on Security Technology (ICCST’15). IEEE, 191--197.Google ScholarGoogle ScholarCross RefCross Ref
  190. Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, and Hui-Ying Du. 2010. Research on the architecture of Internet of things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE’10), vol. 5. IEEE, V5--484.Google ScholarGoogle Scholar
  191. Boyi Xu, Lida Xu, Hongming Cai, Lihong Jiang, Yang Luo, and Yizhi Gu. 2017. The design of an m-Health monitoring system based on a cloud computing platform. Enterprise Info. Syst. 11, 1 (2017), 17--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. Hui Xu, Yangfan Zhou, and Michael R. Lyu. 2014. Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’14), vol. 14. 187--198.Google ScholarGoogle Scholar
  193. Zheng Yan, Peng Zhang, and Athanasios V. Vasilakos. 2014. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42 (2014), 120--134.Google ScholarGoogle ScholarCross RefCross Ref
  194. Kuo-Hui Yeh, Chunhua Su, Wayne Chiu, and Lu Zhou. 2018. I walk, therefore i am: Continuous user authentication with plantar biometrics. IEEE Commun. Mag. 56, 2 (2018), 150--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  195. Yunze Zeng, Amit Pande, Jindan Zhu, and Prasant Mohapatra. 2017. WearIA: Wearable device implicit authentication based on activity information. In IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM’17). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  196. Cha Zhang and Yunqian Ma. 2012. Ensemble Machine Learning: Methods and Applications. Springer.Google ScholarGoogle Scholar
  197. Kai Zhao and Lina Ge. 2013. A survey on the internet of things security. In Proceedings of the 9th International Conference on Computational Intelligence and Security (CIS’13). IEEE, 663--667.Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. Xi Zhao, Tao Feng, and Weidong Shi. 2013. Continuous mobile authentication using a novel graphic touch gesture feature. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS’13). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  199. zighra. {n.d.}. Smart identity defense. Retrieved from https://zighra.com/.Google ScholarGoogle Scholar

Index Terms

  1. Leveraging User-related Internet of Things for Continuous Authentication: A Survey

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 52, Issue 3
            May 2020
            734 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/3341324
            • Editor:
            • Sartaj Sahni
            Issue’s Table of Contents

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 18 June 2019
            • Revised: 1 February 2019
            • Accepted: 1 February 2019
            • Received: 1 February 2018
            Published in csur Volume 52, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • survey
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format