Abstract
Behavioral biometrics are changing the way users are authenticated to access resources by adding an extra layer of security seamlessly. Behavioral biometric authentication identifies users based on a set of unique behaviors that can be observed when users perform daily activities or interact with smart devices. There are different types of behavioral biometrics that can be used to create unique profiles of users. For example, skill-based behavioral biometrics are common biometrics that is based on the instinctive, unique and stable muscle actions taken by the user. Other types include style-based behavioral biometrics, knowledge-based behavioral biometrics, strategy-based behavioral biometrics, etc. Behavioral biometrics can also be classified based on their use model. Behavioral biometrics can be used for one-time authentication or continuous authentication. One-time authentication occurs only once when a user requests access to a resource. Continuous authentication is a method of confirming the user’s identity in real-time while they are using the service. This chapter discusses the different types of behavioral biometrics and explores the various classifications of behavioral biometrics-based on their use models. The chapter highlights the most trending research directions in behavioral biometrics authentication and presents examples of current commercial solutions that are based on behavioral biometrics.
Highlights
This includes the latest research trends and directions related to behavioral biometrics
Typing and swiping patterns are used in several applications to detect the emotions of smartphone users [12]. Another example of behavioral biometrics is mouse dynamics, where the recognition of a user profile is done based on the way a user uses his/her mouse on the computer [13–15]
Face recognition is deployed at the Super Bowl attacks on the World Trade Center draw attention to the need for continuous authentication as a new security measure in global information systems DARPA launches Total Information Awareness (TIA), the first large-scale use of technologies designed to mine data sets for identifying biometric information US-VISIT (United States Visitor and Immigrant Status Indication Technology) becomes operational innovative new algorithms to rapidly and transparently identify computer users as they work Keystroke Dynamics embedded in consumer products Osama bin Laden’s body gets identified with biometrics Mobile biometrics Continuous authentication for mobile application security
Summary
Multi-factor authentication is a promising authentication method, in which the user is required to provide two or more verification factors to gain access to a service or a resource. Biometric security was introduced as a better solution to verify individuals based on their unique characteristics [1] Physical biometrics, such as fingerprints, face recognition and iris scanning, are currently being used extensively in many applications to secure access to servers and services. They are mainly used to perform static authentication to grant access to authorized individuals. The behavioral biometrics are primarily based on either the way human-computer interactions take place or the measurements of the body parts and muscle actions [2] It focuses on how a user conducts a specific activity rather than focusing on an activity’s outcome [3]
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have