Author:
Dagar Aishani,Singh Karan,Khan Tayyab
Abstract
Continuous mobile authentication is an imperative aspect of ensuring the security and privacy of data in the contemporary mobile computing landscape. With the proliferation of mobile devices and the increasing dependency on mobile applications, traditional authentication methods are steadily becoming inadequate to protect sensitive information from unauthorized access. Continuous authentication techniques aim to provide ongoing and seamless verification of user identities, enhancing security while minimizing user inconvenience. This survey paper presents a comprehensive analysis of traditional authentication methods, highlighting key techniques, their integration in mobile systems, applications, and limitations. Then, we elaborate on the various techniques employed in continuous authentication. By examining the strengths and weaknesses of different approaches, this survey aims to provide researchers, practitioners, and developers with a comprehensive understanding of continuous mobile authentication, enabling them to make informed decisions when implementing authentication mechanisms in mobile applications.
Subject
Applied Mathematics,Algebra and Number Theory,Analysis