Continuous authentication in mobile devices using behavioral biometrics

6Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, the development and use of mobile devices such as smartphones and tablets grew significantly. They are used for virtually every activity of our lives, from communication or online shopping to e-banking or gaming, just to name a few. As a consequence, these devices contribute significantly to make our lives more digital, with all the perks and risks that this encompasses. One of the most serious risk is that of an authorized individual gaining physical access to our mobile device and, potentially, to all the applications and personal data it contains. Most of mobile devices are protected using some kind of password, that can be easily spotted by unauthorized users or event guessed. In the last years, new authentication mechanisms have been proposed, such as those using traditional biometrics or behavioral biometrics. In this paper we propose a new continuous authentication mechanism for mobile devices based on behavioral biometrics that monitors user interaction behavior for classifying the identity of the user.

Cite

CITATION STYLE

APA

Rocha, R., Carneiro, D., Costa, R., & Analide, C. (2020). Continuous authentication in mobile devices using behavioral biometrics. In Advances in Intelligent Systems and Computing (Vol. 1006, pp. 191–198). Springer Verlag. https://doi.org/10.1007/978-3-030-24097-4_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free