A survey on continuous authentication methods in Internet of Things environment

FH Al-Naji, R Zagrouba - Computer Communications, 2020 - Elsevier
IoT environment merges the digital and physical universes and enabling them to
communicate real-time data It is crucial to constantly ensure that the user is not …

Privacy-preserving sensor-based continuous authentication and user profiling: a review

L Hernández-Álvarez, JM de Fuentes… - Sensors, 2020 - mdpi.com
Ensuring the confidentiality of private data stored in our technological devices is a
fundamental aspect for protecting our personal and professional information. Authentication …

A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

Leveraging user-related internet of things for continuous authentication: A survey

L Gonzalez-Manzano, JMD Fuentes… - ACM Computing Surveys …, 2019 - dl.acm.org
Among all Internet of Things (IoT) devices, a subset of them are related to users. Leveraging
these user-related IoT elements, it is possible to ensure the identity of the user for a period of …

[HTML][HTML] An approach to detect user behaviour anomalies within identity federations

AG Martín, M Beltrán, A Fernández-Isabel… - computers & …, 2021 - Elsevier
Abstract User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical
techniques and Machine Learning to determine when a significant deviation from patterns or …

ADLAuth: Passive authentication based on activity of daily living using heterogeneous sensing in smart cities

MN Malik, MA Azam, M Ehatisham-Ul-Haq, W Ejaz… - Sensors, 2019 - mdpi.com
The Internet of Things is a rapidly growing paradigm for smart cities that provides a way of
communication, identification, and sensing capabilities among physically distributed …

A novel approach for continuous authentication of mobile users using Reduce Feature Elimination (RFE): A machine learning approach

S Kumari, K Singh, T Khan, MM Ariffin… - Mobile Networks and …, 2023 - Springer
Mobile phones are a valuable object in our daily life. With the acquisition of the latest
technologies, their capabilities and demands increase day by day. However, acquiring the …

[HTML][HTML] Sensor-Based Authentication in Smartphone; a Systematic Review

ML Shuwandy, AS Jouda, MA Ahmed, MM Salih… - Journal of Engineering …, 2024 - Elsevier
With the widespread usage of smartphones, users not just using their smartphone for calls
and messaging only, but they are using it for a variety of purposes such as banking …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

Improving the security and QoE in mobile devices through an intelligent and adaptive continuous authentication system

JM Jorquera Valero, PM Sanchez Sanchez… - Sensors, 2018 - mdpi.com
Continuous authentication systems for mobile devices focus on identifying users according
to their behaviour patterns when they interact with mobile devices. Among the benefits …