explicitly for user authentication, ranging from specifically designed systems including
biometric devices to environmental sensors that can be opportunistically used to feed
behavioural authentication systems. How to integrate all this information in a reliable way to
get a continuous authentication service presents several open challenges. Among these:
how to combine semi-trusted information coming from non-tamper-proof sensors, where to …