Articles with "continuous authentication" as a keyword



Photo by radowanrehan from unsplash

Continuous authentication using biometrics: An advanced review

Sign Up to like & get
recommendations!
Published in 2020 at "Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"

DOI: 10.1002/widm.1365

Abstract: The shortcomings of conventional access control systems for high‐security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session,… read more here.

Keywords: biometrics advanced; continuous authentication; biometrics; using biometrics ... See more keywords
Photo from wikipedia

CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2020.11.023

Abstract: Abstract Raising incidents of security threats among active sessions is an increasing concern in IoT environment. Continuous authentication was introducing to be superior to traditional authentication schemes by constantly verify users’ identities on an ongoing… read more here.

Keywords: continuous authentication; iot continuous; authentication; cab iot ... See more keywords

CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3108822

Abstract: With the widespread usage of mobile devices, the authentication mechanisms are urgently needed to identify users for information leakage prevention. In this article, we present CAGANet, a convolutional neural network (CNN)-based continuous authentication on smartphones… read more here.

Keywords: authentication; network; based continuous; cnn based ... See more keywords

HA-CAAP: Hardware-Assisted Continuous Authentication and Attestation Protocol for IoT Based on Blockchain

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3530775

Abstract: The increasing integration of Internet of Things (IoT) devices in various sectors has created complex and dynamically changing interconnected systems. In several multiauthority and multidomain applications, IoT devices may continuously change their connectivity status, leading… read more here.

Keywords: attestation; authentication; continuous authentication; protocol ... See more keywords

CABA: Continuous Authentication Based on BioAura

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2016.2622262

Abstract: Most computer systems authenticate users only once at the time of initial login, which can lead to security concerns. Continuous authentication has been explored as an approach for alleviating such concerns. Previous methods for continuous… read more here.

Keywords: caba continuous; based bioaura; continuous authentication; authentication ... See more keywords

A Low-Calculation Contactless Continuous Authentication Based on Postural Transition

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3196270

Abstract: Currently, available contactless continuous authentication (CA) techniques depend on physiological biometrics to identify individuals at long intervals through complex feature extraction, resulting in poor accuracy, high computation costs, and security vacuums during lengthy intervals. To… read more here.

Keywords: authentication; biometrics; contactless continuous; postural transition ... See more keywords

Healthcare Security: Post-Quantum Continuous Authentication With Behavioral Biometrics Using Vector Similarity Search

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3531197

Abstract: With the increasing digitization of medical records and the interconnected nature of healthcare networks, robust security measures are vital to mitigate the risk of data breaches, cyberattacks, and unauthorized access. Existing healthcare security models, like… read more here.

Keywords: biometrics; authentication; healthcare security; continuous authentication ... See more keywords

Continuous Authentication via Wrist Photoplethysmogram: An Extensive Study

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2024.3443208

Abstract: Continuous authentication (CA) based on wrist photoplethysmogram (PPG) has been increasingly studied, but still requires further extensive investigation on PPG reliability over time and heart rates for real-world deployments. In this paper, we first analyze… read more here.

Keywords: wrist photoplethysmogram; across session; authentication; continuous authentication ... See more keywords

A Continuous Authentication Framework for Securing Metaverse Identities

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2025.3553711

Abstract: In the Metaverse, continuous authentication is essential for verifying the ongoing connection between a user’s physical identity and avatar, ensuring secure access to various services. This process is crucial for confirming identities, maintaining security, and… read more here.

Keywords: authentication; continuous authentication; securing metaverse; authentication framework ... See more keywords