Abstract
Recent developments in sensing and communication technologies have led to an explosion in the use of mobile devices such as smartphones and tablets. With the increase in the use of mobile devices, users must constantly worry about security and privacy, as the loss of a mobile device could compromise personal information. To deal with this problem, continuous authentication systems (also known as active authentication systems) have been proposed, in which users are continuously monitored after initial access to the mobile device. In this article, we provide an overview of different continuous authentication methods on mobile devices. We discuss the merits and drawbacks of the available approaches and identify promising avenues of research in this rapidly evolving field.
Original language | American English |
---|---|
Article number | 7503170 |
Pages (from-to) | 49-61 |
Number of pages | 13 |
Journal | IEEE Signal Processing Magazine |
Volume | 33 |
Issue number | 4 |
DOIs | |
State | Published - Jul 2016 |
ASJC Scopus subject areas
- Signal Processing
- Electrical and Electronic Engineering
- Applied Mathematics