scispace - formally typeset
Journal ArticleDOI

Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective

Reads0
Chats0
TLDR
The nature of CA in IoT applications is outlined, the key behavioral signals are highlighted, the extant solutions from an AI perspective are summarized, and the challenges and promising future directions to guide the next generation of AI-based CA research are discussed.
Abstract
In the Internet-of-Things (IoT) era, user authentication is essential to ensure the security of connected devices and the customization of passive services However, conventional knowledge-based and physiological biometric-based authentication systems (eg, password, face recognition, and fingerprints) are susceptible to shoulder surfing attacks, smudge attacks, and heat attacks The powerful sensing capabilities of IoT devices, including smartphones, wearables, robots, and autonomous vehicles enable continuous authentication (CA) based on behavioral biometrics The artificial intelligence (AI) approaches hold significant promise in sifting through large volumes of heterogeneous biometrics data to offer unprecedented user authentication and user identification capabilities In this survey article, we outline the nature of CA in IoT applications, highlight the key behavioral signals, and summarize the extant solutions from an AI perspective Based on our systematic and comprehensive analysis, we discuss the challenges and promising future directions to guide the next generation of AI-based CA research

read more

Citations
More filters
Journal ArticleDOI

DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application

TL;DR: In this paper, the authors investigated whether it is possible to continuously authenticate users via behavioral biometrics with a certain performance on a mobile banking application, and they developed a continuous authentication scheme, named DAKOTA, on top of this application.
Journal ArticleDOI

Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap

TL;DR: An overview of prevailing cybersecurity data, a multi-disciplinary AI for Cybersecurity roadmap that centers on major themes such as cybersecurity applications and data, advanced AI methodologies for cybersecurity, and AI-enabled decision making are offered.
Journal ArticleDOI

HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics

TL;DR: In this paper, a hierarchical implicit authentication (HIAuth) system was proposed for wearables that utilizes the heart rate, gait, and breathing audio signals based on their availability to authenticate a user.
Journal ArticleDOI

Nutrition and Functional Foods for Healthy Aging

TL;DR: Most popular website for free eBooks.com, you have the option to browse by most popular titles, recent reviews, authors, titles, genres, languages and more.
Journal ArticleDOI

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities

TL;DR: Zhang et al. as mentioned in this paper performed a study to investigate users' touch behavior within Email applications on smartphones, with Email being one of the most important and widely used means in connecting with others.
References
More filters
Journal ArticleDOI

Generative Adversarial Nets

TL;DR: A new framework for estimating generative models via an adversarial process, in which two models are simultaneously train: a generative model G that captures the data distribution and a discriminative model D that estimates the probability that a sample came from the training data rather than G.
Journal ArticleDOI

A Survey on Transfer Learning

TL;DR: The relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift are discussed.
Proceedings ArticleDOI

ShuffleNet: An Extremely Efficient Convolutional Neural Network for Mobile Devices

TL;DR: ShuffleNet as discussed by the authors utilizes two new operations, pointwise group convolution and channel shuffle, to greatly reduce computation cost while maintaining accuracy, and achieves an actual speedup over AlexNet while maintaining comparable accuracy.
Proceedings Article

Learning both weights and connections for efficient neural networks

TL;DR: In this paper, the authors proposed a method to reduce the storage and computation required by neural networks by an order of magnitude without affecting their accuracy by learning only the important connections using a three-step method.
Posted Content

On the difficulty of training Recurrent Neural Networks

TL;DR: This paper proposes a gradient norm clipping strategy to deal with exploding gradients and a soft constraint for the vanishing gradients problem and validates empirically the hypothesis and proposed solutions.
Related Papers (5)