Abstract

Continuous authentication in the Mobile Internet of Things should be based as broadly as possible, since a wide range of factors continuously reveal unexpected correlations. Such factors may include captured events (e.g., password, fingerprint, application start and end, network connect, and disconnect), continuous time series (e.g., gesture, typing rate, accelerometer, GPS, ambient sound, light levels, and time-of-day), and derived behavioral features (e.g., user sociability, browser and application menus, application choice). All these factors have been shown to correlate with the actual user identity, often in surprising combinations. More and more sensors are being deployed in autonomous devices, smart environments and vehicles, enabling even further behavioral and contextual data to be analyzed. The pegs of this continuous authentication “big tent” are moving out further than ever before, bringing it closer to practical uses in our everyday lives.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.