0% found this document useful (0 votes)
119 views21 pages

PDF

Uploaded by

Waleed Shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views21 pages

PDF

Uploaded by

Waleed Shahid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Hindawi

Security and Communication Networks


Volume 2019, Article ID 5452870, 20 pages
https://doi.org/10.1155/2019/5452870

Review Article
Authentication and Authorization for Mobile IoT Devices Using
Biofeatures: Recent Advances and Future Trends

Mohamed Amine Ferrag ,1 Leandros Maglaras ,2,3 and Abdelouahid Derhab 4

1
Department of Computer Science, Guelma University, B.P. 401, 24000, Algeria
2
School of Computer Science and Informatics, De Montfort University, Leicester, UK
3
National Cyber Security of Greece, General Secretariat of Digital Policy, Athens, Greece
4
Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia

Correspondence should be addressed to Leandros Maglaras; [email protected]

Received 25 January 2019; Revised 4 April 2019; Accepted 22 April 2019; Published 5 May 2019

Guest Editor: Jorge B. Bernabe

Copyright © 2019 Mohamed Amine Ferrag et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to
summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological
(e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The
different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices
are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are
also presented. More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT
devices. Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in
biometrics-based authentication schemes for IoT devices.

1. Introduction has introduced the Mobile-ID system that allows citizens


to conduct Internet voting [3] and combines biometric
Biometric identification enables end-users to use physical identification and mobile devices. This system that was quite
attributes instead of passwords or PINs as a secure method innovative when it was initially introduced possesses several
of accessing a system or a database. Biometric technology is threats to the electoral procedure and was criticized for being
based on the concept of replacing “one thing you have with insecure [4].
you” with “who you are,” which has been seen as a safer
technology to preserve personal information. The possibili- According to a survey by Javelin Strategy & Research,
ties of applying biometric identification are really enormous. in 2014, $16 billion was stolen by 12.7 million people who
Biometric identification is applied nowadays in sectors were victims of identity theft in the US only [5]. This amount
where security is a top priority [1], like airports, and could be is calculated without taking into account the economic
used as a means to control border-crossing at sea, land, and problems and psychological oppression that victims of this
air frontier [2]. Especially for the air traffic area, where the fraud suffer. From the banking sector and businesses to access
number of flights will be increased by 40% before 2013, the to homes, cars, personal computers, and mobile devices,
authentication of mobile IoT devices will be achieved when biometric technology offers the highest level of security in
the biofeatures models become sufficiently mature, efficient, terms of privacy and privacy protection and secure access.
and resistant to IoT attacks. Mobile devices are nowadays an essential part of our
Another area where biometric identification methods are everyday life, as they are used for a variety of mobile
starting to be adopted is electronic IDs. Biometric identifi- applications. Performing biometric authentication through
cation cards such as the Estonian and Belgian national ID mobile devices can provide a stronger mechanism for identity
cards were used in order to identify and authenticate eligible verification as the two authentication factors, “something
voters during elections. Moving one step further, Estonia you have” and “something you are,” are combined. Several
2 Security and Communication Networks

Data producer

Data

Data

Data

Data

Data

Data

Data

Data
0

0
Edge computing
0

Data

Data

Data

Data Edge
Request
0

Data

Data

Result
0

Data
Two-way computing
0
streams in the edge
Data

environment
0

Data

Edge-Things Interface

AP 5G

1c2biometric-based
authentication for IoT
devices in a peer-to-
peer environment
Data Producer/Consumer

Server 1
AP 5G 1b2Users accessing
remote servers via IoT
Internet Server 2 devices
.
.
.
Server n

1a2Users accessing IoT


devices
Biometric
User Sensor Mobile computing
device

Figure 1: Types of communication for IoT devices in edge environments during the authentication and authorization. (a) Users accessing
IoT devices, (b) users accessing remote servers via IoT devices, and (c) biometric-based authentication for IoT devices in a peer-to-peer
environment.

solutions that include multibiometric and behavioral authen- exploited by adversaries to make illegal accesses, and (2) how
tication platforms for telecom carriers, banks, and other to ensure that the user’s biometric reference templates are not
industries were recently introduced [6]. compromised by a hacker at the device level or the remote-
In the literature, many authentication schemes based server level. This paper extends the work we have presented
on biofeatures models for mobile IoT devices have been in [7].
proposed. As shown in Figure 1, the schemes can perform two Our contributions in this work are the following:
different authentication operations: they either (a) authenti- (i) We classify the related surveys according to several
cate the users to access the mobile devices or (b) authenticate criteria, including deployment scope, focus biometric
the users to access remote servers through mobile devices. area, threat models, countermeasures, and ML/DM
The main challenges that are facing biometric-based authen- algorithms.
tication schemes are (1) how to design an authentication (ii) We present the machine learning and data mining
mechanism that is free from vulnerabilities, which can be methods used by authentication and authorization
Security and Communication Networks 3

Table 1: Related surveys on biometric authentication.

Reference Deployment scope Focus biometric area Threat models Countermeasures ML and DM
Gafurov (2007) [8] Not mobile Gait recognition No No No
Revett et al. (2008) [9] Not mobile Mouse dynamics No No No
Yampolskiy and Govindaraju (2008) [10] Not mobile Behavioral-based No No No
Shanmugapriya and Padmavathi (2009) [11] Not mobile Keystroke dynamics No No Yes
Karnan et al. (2011) [12] Not mobile Keystroke dynamics No No Yes
Banerjee and Woodard (2012) [13] Not mobile Keystroke dynamics No No Yes
Teh et al. (2013) [14] Not mobile Keystroke dynamics No No Yes
Bhatt et al. (2013) [15] Not mobile Keystroke dynamics No No Yes
Meng et al. (2015) [16] Mobile device All Yes Yes Partial
Teh et al. (2016) [17] Mobile device Touch dynamics No No Yes
Mahfouz et al. (2017) [18] Smartphone behavioral-based No No Yes
Mahadi et al. (2018) [19] Not mobile behavioral-based No No Yes
Sundararajan and Woodard (2018) [20] Not mobile All No No Yes
Rattani and Derakhshani (2018) [21] Mobile device Face recognition Yes Yes Yes
Our survey Mobile IoT device All Yes Yes Yes
ML and DM: machine learning (ML) and data mining (DM) algorithms

schemes for mobile IoT devices, including unsuper- (i) Deployment scope: it indicates whether the authenti-
vised, semisupervised, and supervised approaches. cation scheme is deployed on mobile devices or not.
(iii) We present all the biofeatures used by authentication (ii) Focus biometric area: it indicates whether the survey
and authorization schemes for mobile IoT devices. focused on all/specific biometric features.
(iv) We provide a comprehensive analysis and qualitative (iii) Threat models: it indicates whether the survey consid-
comparison of the existing authentication and autho- ered the threats against the authentication schemes.
rization schemes for mobile IoT devices. (iv) Countermeasures: it indicates whether the survey
(v) We emphasize the challenges and open issues of focused on and considered the countermeasures to
authentication and authorization schemes for mobile defend the authentication schemes.
IoT devices. (v) Machine learning (ML) and data mining (DM) algo-
rithms: they indicate whether the survey mentions
The rest of this paper is organized as follows. Section 2 for each solution the used machine learning or data
gives the related surveys on biometric authentication. In mining method.
Section 3, we present the different machine learning and data
mining algorithms used by authentication and authorization Some surveys described the authentication schemes that
schemes for mobile IoT devices. In Section 4, we provide the only consider specific biofeatures. For instance, the surveys
new trends of biometric technologies including human phys- in [11–15] only focused on the keystroke dynamics. On the
iological (e.g., face, eyes, fingerprints-palm, and electrocar- other hand, Gafurov [8] presented biometric gait recognition
diogram) and behavioral features (e.g., signature, voice, gait, systems. Revett et al. [9] surveyed biometric authentica-
or keystroke). In Section 5, we clearly highlight the pros and tion systems that rely on mouse movements. Yampolskiy
cons of the existing authentication and authorization schemes and Govindaraju [10] presented a comprehensive study on
for mobile IoT devices. Then, we discuss the challenges and behavioral biometrics. Mahadi et al. [19] surveyed behavioral-
suggest future research directions in both Sections 6 and 7. based biometric user authentication and determined the set
Lastly, Section 8 presents conclusions. of best classifiers for behavioral-based biometric authentica-
tion. Sundararajan and Woodard [20] surveyed 100 different
approaches that leveraged deep learning and various bio-
2. Related Surveys on metric modalities to identify users. Teh et al. [17] presented
Biometric Authentication different authentication solutions that rely on touch dynamics
in mobile devices. Rattani and Derakhshani [21] provided
In the literature, there are different related surveys that deal the state of the art related to face biometric authentication
with user authentication. Although some of them covered schemes that are designed for mobile devices. They also
different authentication methods [103–105], we only consider discussed the spoof attacks that target mobile face biometrics
those that were fully dedicated for biometric authentication. as well as the antispoofing methods. Mahfouz et al. [18]
As shown in Table 1, we classify the surveys according to the surveyed the behavioral biometric authentication schemes
following criteria: that are applied on smartphones. Meng et al. [16] surveyed the
4 Security and Communication Networks

authentication frameworks using biometric user on mobile Authentication Dataset, which contains the front-facing cam-
phones. They identified eight potential attack against these era face video for 50 iPhone users (43 males and 7 females)
authentication systems along with promising countermea- with three different ambient lighting conditions: well-lit,
sures. Our survey and [16] both focus on authentication dimly-lit, and natural daylight. Compared to Viola-Jones face
schemes that are designed for mobile device and consider detector, Mahbub et al.’s framework can achieve superior
all the biometric features and deal with threat models and performance.
countermeasures. However, [16] does not give information In another study, the SVM classifier was attempted as the
related to the used machine learning or data mining method learning algorithm by Gunasinghe and Bertino [34], face as
of all the surveyed solutions. In addition, [16] only covers the biofeature, and eigenfaces as the feature extraction algo-
papers up to 2014, whereas the coverage of our survey is up to rithm. The trained SVM classifier helps to the artifacts stored
2018. To the best of our knowledge, this work is the first that in the mobile IoT devices. Compared to Mahbub et al.’s [92]
thoroughly covers threats, models, countermeasures, and the approach, the protocol in [34] considers privacy-preserving
machine learning algorithms of the biometric authentication of the training data, which uses three secrets (𝑆𝑖 : 𝑖 ∈ {1, 2,
schemes. 3}) in different phases of the scheme: 𝑆1 of size 128 𝑏𝑖𝑡𝑠, 𝑆2 of
size 160 𝑏𝑖𝑡𝑠, and 𝑆3 of size 256 𝑏𝑖𝑡𝑠.
3. Machine Learning and Data Chen et al. [72] introduced a two-factor authentication
Mining Algorithms protocol using rhythm, which can be applied for mobile
IoT devices. Specifically, Chen et al.’s protocol employs
In this section, we list the different machine learning and data SVM as a machine learning classifier and LibSVM in the
mining algorithms used by biometric-based authentication implementation phase. The false-positive and false-negative
schemes for IoT devices, as presented in Table 2. rates achieve 0.7% and 4.2%, respectively. In general, there
are two behavioral biometric modalities in the construction
3.1. Support Vector Machine (SVM). The SVM is a popular of an authentication scheme based on the biofeature: (1)
and powerful binary classifier, which aims to find a hyper- using one behavioral biometric model, which does not need
plane within the feature space that separates between two any additional hardware to capture data, and (2) using a
classes. SVM is used by seven authentication schemes for combination of the behavioral biometric models.
IoT devices in edge environments using biofeatures [24, 32–
34, 72, 78, 92]. 3.2. Deep Learning Approach. Actually, deep learning is used
In [24], Frank et al. used two classifiers, k-nearest- to authenticate low-power devices in the IoT networks. Deep
neighbors (kNN) and SVM, with an RBF kernel. In this study, learning approach is based on an artificial neural network
two classes are chosen, namely, (i) user of interest and (ii) the (ANN), consisting of many layers of neurons, referred to as
rest of users. In the training data phase, this study tunes the hidden layers, between two other layers: input and output.
two relevant parameters, that is, 𝛾 and 𝐶 of the RBF-SVM, Each layer receives and interprets information from the
which are tuned under fivefold cross-validation. The first previous layer. Unlike SVM, the learning runtime increases
parameter 𝛾 is used for controlling the Gaussian radial-basis when the number of features in an ANN increases. Ferdowsi
function. The second parameter 𝐶 is used for controlling the and Saad [39] proposed a deep learning method based
trade-off between maximizing the margin and minimizing on the long short-term memory (LSTM), which uses the
the number of exceptions. fingerprints of the signal 𝑦 generated by an IoT mobile device.
In Sitova et al.’s work [32], an SVM classifier with scaled In addition, LSTM algorithm is used to allow an IoT mobile
Manhattan (SM) and scaled Euclidian (SE) is used to perform device updating the bit stream by considering the sequence
verification experiments. For parameter tuning, the RBF of generated data. The paper expressed that the findings
kernel was selected to perform a grid search to find the reported that dynamic LSTM watermarking is able to detect
parameter. some attacks such as eavesdropping.
In order to detect faces of a particular size, Sarkar et al. Das et al. [40] used a deep learning-based classifier to
[33] introduced a face detection algorithm, which is based on have a faster system against high-power adversaries. Similar
deep feature combined with a SVM classifier. Specifically, the to the work in [39], this study uses the long short-term
study passes the image through a deep convolutional neural memory (LSTM). The experiments used a testbed of LoRa
network; then they used train SVMs of different sizes in order low-power wireless, which consists of 29 Semtech SX1276
to achieve scale invariance. During training step, Sarkar et al.’s chips as LoRa transmitters and a Semtech SX1257 chip
scheme uses 5202 images from the UMD-AA database, which as the receiver. The experimental results showed that the
is a database of 720p videos and touch gestures of users on classification performance is more promising with respect to
a mobile device (iPhone). The experimental results showed state-of-the-art LoRa transmitters.
that the proposed idea can detect the partial or the extremely The work by Bazrafkan and Corcoran [106] used a deep
posed faces in IoT environment. U-shaped network with 13 layers for the segmentation task.
The approach described by Mahbub et al. [92] is a The study used a 3x3 kernel that maps the input to the first
framework for authentication and authorization of users’ convolutional hidden layer in order to enhance iris authen-
faces on mobile IoT devices. Their approach trains a linear tication for mobile IoT devices. They used two databases:
SVM with statistical features. The study used the Active (1) CASIA Thousand, which contains 20k images, and (2)
Security and Communication Networks 5

Table 2: Machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices.

Machine learning and data


Schemes EER Accuracy FAR FRR
mining methods
Agglomerative complete
[22] 19.68% n/a n/a n/a
link clustering approach
Support vector distribution [23] 0.52% n/a n/a n/a
estimation [24] 0 - 4% n/a n/a n/a
Gaussian mixture model [25] 2.13% n/a n/a n/a
[24] 0% - 4% n/a n/a n/a
[26] n/a 87.8% 18.3% 6.1%
[27] n/a n/a 0.37% 1.12%
k-nearest-neighbors (kNN) [28] n/a 96.4% 3.6% 0%
[29] n/a 96.86% n/a n/a
[30] 3.7% n/a n/a n/a
[31] 0.5% n/a n/a n/a
[24] 0 - 4% n/a n/a n/a
[32] 7.16% n/a n/a n/a
[33] n/a 96.0% n/a n/a
[34] n/a n/a 0.023% 0.044%
Support vector machine [35] n/a n/a 2.10% 2.24%
(SVM) [36] n/a n/a 0.004% 0.01%
[26] n/a 87.8% 18.3% 6.1%
[27] n/a n/a 0.37% 1.12%
[37] 1.3% n/a 2.96% 0.86%
[35] n/a n/a 2.61% 2.51%
[29] n/a 98% n/a n/a
A computation efficient
[38] 10.00% n/a 9.78% 10.00%
statistical classifier
[39] 0.02% n/a n/a n/a
[40] n/a 99.58% n/a n/a
Deep learning [41] n/a 98.55-99.71% n/a n/a
[42] n/a 99.10% n/a n/a
[43] n/a 97.5% n/a n/a
Local binary patterns
[44] 0.1-0.13% n/a n/a n/a
algorithm
Mel-frequency cepstral
[45] n/a 80.6% 0.01% 15%
coefficients
Pupillary light reflex [46] 11.37% n/a n/a n/a
Euclidean distance,
[47] n/a 0.9992% 0% 0.0015%
hamming distance
[33] n/a 96.0% n/a n/a
[48] n/a n/a 1.5% n/a
Deep convolutional neural
network [49] 8.6% 91.4 n/a n/a
[50] n/a 93.2 n/a n/a
[51] 3.1% n/a n/a n/a
Genetic algorithm [52] 0.46% n/a n/a n/a
Artificial neural network [53] 2.13% n/a n/a n/a
(ANN) [54] 2.46% n/a n/a n/a
Gauss-Newton based
[55] 4.1% n/a 3.33% 3.33%
neural network
Radial integration
[56] 10.8% n/a n/a n/a
transform
6 Security and Communication Networks

Table 2: Continued.
Machine learning and data
Schemes EER Accuracy FAR FRR
mining methods
Weibull distribution [57] 2-10% n/a n/a n/a
Online learning algorithms [58] 0.04% 96% n/a n/a
Random forest (RF) [59] 7.5% n/a 17.66% n/a
[27] n/a n/a 0.37% 1.12%
Neural network (NN) [28] n/a 96.4% 3.6% 0%
[60] n/a n/a 15% 0%
Circular integration
[56] 10.8% n/a n/a n/a
transform
[26] n/a 86.4% 16.1% 11.0%
[35] n/a n/a 2.10% 2.24%
Decision tree (DT) [61] n/a n/a 0.88% 9.62%
[62] n/a n/a 0.005% 3.027%
[29] n/a 91.72% n/a n/a
Learning Algorithm for
Multivariate Data Analysis [63] n/a n/a 0% 0.36%
(LAMDA)
[35] n/a n/a 2.47% 2.53%
Bayesian network (BN)
[29] n/a 95.02% n/a n/a
[29] n/a 93.7% n/a n/a
Naive Bayes [36] n/a n/a 0.004% 0.01%
[64] 8.21% n/a n/a n/a
Pearson product-moment
correlation coefficient [28] n/a 96.4% 3.6% 0%
(PPMCC)
Keyed random projections
[65] 7.28% n/a n/a n/a
and arithmetic hashing
One-dimensional
multiresolution local [66] 7.89% n/a 1.57% 0.39%
binary patterns
EER: equal error rate; FAR: false acceptance rate, FRR: false rejection rate; n/a: not available.

Bath 800, which contains 24156 images. The segmentation 3.3. Deep Convolutional Neural Network. The deep convo-
results are reported as 98.55% for the Bath 800 and 99.71% lutional neural networks (DCNNs) for face detection were
for CASIA Thousand. The paper also states the benefits of attempted by Ranjan et al. [107], which can be classified into
the deep learning technique such as efficient segmentation on two categories: the region-based approach and the sliding-
large data sets. window approach. The DCNN can identify whether a given
In their study, Bayar and Stamm [42] use a universal proposal contains a face or not.
forensic approach using deep learning in order to detect Based on deep learning and random projections, Liu et
multiple types of image forgery. For image recognition, the al. [48] proposed a novel finger vein recognition algorithm,
convolutional neural networks (CNNs) are used as tool named FVR-DLRP, which could be used for mobile IoT
from deep learning. Specifically, the CNN proposed contains devices. The FVR-DLRP algorithm uses four main phases,
eight layers: the proposed new convolutional layer, two namely, (1) feature extraction, (2) random projection, (3)
convolutional layers, two max-pooling layers, and three fully training, and (4) matching. The finger vein feature extraction
connected layers. The first layer of the network is 227 × 227 is based on 3×3 regions. The Johnson–Lindenstrauss theorem
grayscale image. The proposed CNN is evaluated as a binary is used for the random projections. In the training phase, the
and multiclass classifier. Although the false-positive rate is deep belief network is applied to generating the biometric
not reported, the Caffe deep learning framework is used, template. The experimental results on finger vein laboratory
which shows that the CNN proposed model can distinguish database, named FV NET64, involving 64 people’s finger vein
between unaltered and manipulated images with at least image and each of them contributing 15 acquisitions, show
99.31% and 99.10% accuracy for a binary and multiclass that the FVR-DLRP algorithm achieves 91.2% for recognition
classifier, respectively. rate (GAR) and 0.3% for false acceptance rate (FAR). In
Security and Communication Networks 7

the study by Sarkar et al. [33], a deep convolutional neural to model the voice signal. In the experiment section, Kim’s
network is proposed for mobile IoT devices. According to study used an HP iPAQ rw6100 mobile device equipped with
the study, the OpenCL and RenderScript based libraries for a camera and sound-recording device. The study reported an
implementing deep convolutional neural networks are more ERR of 6.42% and 6.24% for teeth authentication and voice
suitable for mobile IoT devices compared to the CUDA based authentication, respectively.
schemes.
3.7. Naive Bayes. To map from the feature space to the deci-
3.4. Decision Tree (DT). DTs are a type of learn-by-example sion space, Fridman et al. [36] used the Naive Bayes classifier,
pattern recognition method, which were used by five studies which is based on the so-called Bayesian theorem. In the
[26, 35, 61, 62, 108]. In [61], Sheng et al. proposed a parallel experiment section, the study reached a false acceptance rate
decision trees-based system in order to authenticate users of 0.004 and a false rejection rate of 0.01 after 30 seconds
based on keystroke patterns, which could be applied for of user interaction with the device. Therefore, Traore et al.
mobile IoT devices. According to the study, a parallel DT [64] considered two different biometric modalities, namely,
alone cannot solve the authentication on keystroke patterns. keystroke and mouse dynamics. Their study used a Bayesian
The training data contains 43 users; each of them typed a network to build the user profile and then used it to classify
given common string of 37 characters. The study achieves the monitored samples. The experimental results show that
9.62% for FRR and 0.88% for FAR. Therefore, Kumar et the mouse dynamics model has a reached an equal error rate
al. [62] presented a fuzzy binary decision tree algorithm, (EER) of 22.41%, which is slightly lower than the keystroke
named FBDT, for biometric-based personal authentication. dynamics that reached an EER of 24.78%. In addition, Bailey
The FBDT was able to be detected with FAR=0.005% et al. [35] used a Bayesian network with two machine learning
and FRR=3.027% on palm print and FAR=0.023% and algorithms: LibSVM and J48. The results achieved a full-
FRR=8.1081% on iris and FAR=0% and FRR=2.027% on the fusion false acceptance rate of 3.76% and a false rejection rate
bimodal system. To enhance the network authentication in of 2.51%.
ZigBee devices, Patel et al. [108] presented an authentication To solve the problem of verifying a user, Buriro et al.
system that employs ensemble decision tree classifiers. Specif- [29] proposed AnswerAuth, an authentication mechanism,
ically, the study applied multiclass AdaBoost ensemble classi- which is based on the extracted features from the data
fiers and nonparametric random forest on the fingerprinting recorded using the built-in smartphone sensors. In effect, the
arena. AnswerAuth mechanism is tested using a dataset composed
of 10,200 patterns (120 from each sensor) from 85 users and
3.5. k-Nearest-Neighbors (kNN). The kNN algorithm identi- six classification techniques are used: Bayes network, naive
fies the 𝑘 training observations to belong to a group among a Bayes, SVM, kNN, J48, and random forest. According to the
set of groups based on a distance function in a vector space to study, random forest classifier performed the best with a true
the members of the group [28]. In our study, we found that it acceptance rate of 99.35%.
is always combined with other classifiers in order to provide
a fast classification. The study in [24] uses the kNN algorithm 3.8. Observations Related to Performance Metrics. There are
and a support vector machine with an RBF kernel. The study several performance metrics by which the machine learning
in [26] combines three classifiers, namely, the kNN algorithm, and data mining methods for authentication could be com-
support vector machines, and decision trees. The study in pared: equal error rate (EER), accuracy, false acceptance rate
[27] combines three models: (1) a nearest-neighbor-based (FAR), and false rejection rate (FRR).
detector model, (2) a neural network detector model, and (3) The EER of 19.68% is obtained by Maiorana et al.’s scheme
a support vector machine model. The study by Jagadeesan and [76] when using all the first E = 10 acquisitions of each user
Hsiao [28] incorporates statistical analysis, neural networks, for enrollment. The BEAT scheme [23] achieves an average
and kNN algorithms, in which the experimental results show equal error rate of 0.5% with 3 gestures and one of 0.52%
that the identification accuracy is 96.4% and 82.2% for the with single signature using only 25 training samples. The
application-based model and the application-independent Touchalytics framework [24] trains user profiles based on
model, respectively. vertical and horizontal strokes using a k-nearest neighbor
classifier and a Gaussian RBF kernel support vector machine,
3.6. Statistical Models. In order to perform authentication in which these classifiers achieve EER between 0% and 4%,
of the user’s identity on mobile IoT devices, Tasia et al. depending on the application scenario. Kim and Hong’s
[38] used a computation efficient statistical classifier, which method [25] is evaluated using 1000 teeth images and voices,
has low computational complexity compared to fuzzy logic which achieves an EER of 2.13%. Shen et al.’s approach
classifiers and does not require comparison with other users’ [27] achieves a practically useful level of performance with
samples for identification. Therefore, hidden Markov model FAR of 0.37% and FRR of 1.12% obtained by the SVM
is a statistical model where Kim and Hong [25] used an detector, which shows that mouse characteristics extracted
embedded hidden Markov model algorithm and the two- from frequent behavior segments are much more stable. The
dimensional discrete cosine transform for teeth authentica- average accuracy of application-based user reauthentication
tion. For the voice authentication on mobile IoT devices, the system proposed by Jagadeesan and Hsiao [28] is 96.4%
study uses pitch and mel-frequency cepstral coefficients as with 0% FRR and 3.6% FAR for 2-, 3-, 4-, and 5-user sets.
feature parameters and a Gaussian mixture model algorithm Compared to the work in [109], the HMOG scheme [32]
8 Security and Communication Networks

achieves the lowest EERs (7.16% in walking and 10.05% in Table 3: Bio-features used by authentication schemes for IoT
sitting). devices in edge environments.
Based on the mouse data from 48 users, Nakkabi et al’s
Biofeature Schemes
scheme [63] achieves a false acceptance rate of 0% and a false
rejection rate of 0.36%. Compared to Nakkabi et al.’s scheme Gaze gestures [67–69]
[63], Zheng et al.’s scheme [37] achieves an equal error rate Electrocardiogram [70, 71]
of 1.3% with just 20 mouse clicks under two sets of data: one Voice recognition [25, 43, 72, 73]
set of 30 users under controlled circumstances and another Signature recognition [23]
set of over 1,000 users on a forum website. The EBDL scheme Gait recognition [74]
[35] produces a FAR of 2.24% and FRR of 2.10%, which are Behavior profiling [23, 24, 32, 75]
in line with previous singular modality work. On the full
Keystroke dynamics [38, 53, 61, 64, 76–78]
dataset, the authentication system proposed by Fridman et
Touch dynamics [17, 69]
al. [36] achieved FAR of 0.004% and FRR of 0.01% after
30s of user interaction with the device. The study by Abate Fingerprint [62, 79–84]
et al. [44] uses the local binary patterns (LBPs) algorithm Smart card [85–87]
for authenticating the users on mobile devices through ear Multitouch interfaces [88, 89]
shape and arm gesture, which achieved EER values of 0.1 for Graphical password [90]
the combined ear-arm and 0.13 for the single-arm gesture. Face recognition [33, 34, 91–93]
Annapurani et al. [47] use the Euclidean method, in which Iris recognition [41, 91, 94, 95]
the authentication rate is 99.8% and 99.7% for the fused one
Rhythm [72]
and the tragus compared to the shape of the ear which has
99.55%. Capacitive touchscreen [96]
Ferdowsi and Saad [39] proposed a deep learning algo- Ear shape [44]
rithm using long short-term memory (LSTM) which is Arm gesture [44]
trained on accelerometer data, and the testing error is close to Plantar biometrics [97]
0.02%, which is acceptable for an IoT application. Therefore, Mouse dynamics [27, 35, 37, 64, 78]
Das et al. [40] used an LSTM unit of length 2048 and with Slap fingerprints [98]
𝑁𝑝 = 21 𝑙𝑎𝑦𝑒𝑟𝑠, which archives the classification accuracy of Palm dorsal vein [98]
99.58%. The study by Bazrafkan and Corcoran [41] enhances
Hand geometry [98]
iris authentication on handheld devices using deep learning,
which trained the network on the augmented databases (Bath Behavioral biometric [58]
800 and CASIA Thousand). The segmentation results for the
test set on these two databases were 98.55% for Bath 800 and
99.71% for CASIA Thousand. Bayar and Stamm [42] trained features and his/her own token, while type 3 impostors use
multiclass convolutional neural networks (CNN) over 56 000 compromised gait features and they own token for authen-
iterations, which achieve an accuracy of 99.10% of detecting tication). In addition, the Gaithashing scheme achieves very
the different four types of forgery. Alhussein and Muhammad high accuracy (EER=10.8%) for type 2 impostors (i.e., an
[43] show that the voice pathology detection accuracy reaches impostor that uses a compromised token and his/her own
up to 97.5% using the transfer learning of CNN models. gait features for authentication). Therefore, Alpar [55] pro-
The results obtained by the FBDT scheme [62] validate the posed a novel frequency based authentication method and
effectiveness of the biometric-based authentication, in which a Gauss-Newton based neural network classifier in order
the best error rates are reported as FAR 0.005% and FRR to provide the foundations of frequency authentication to
3.027% on palm print, FAR 0.023% and FRR 8.1081% on enhance keystroke authentication protocols. The conducted
the iris, and FAR 0% and FRR 2.027% on the bimodal experiments are 3.33% FAR, 3.33% FRR, and 4.1% EER, which
system. all are promising. Khalifa et al.’s system [52] uses genetic
The study by Taigman et al. [49] proposed a DeepFace algorithm, which shows that the fusion of the three unimodal
framework, which reaches an accuracy of 97.35% on the systems has improved significantly the performance of the
Labeled Faces in the Wild (LFW) dataset, reducing the error multimodal system. In addition, the EER has increased from
of the current state of the art by more than 27%. In addition, 2.51% to 0.46%.
the DeepFace framework reports an accuracy of 91.4% on
the YouTube Faces (YTF) dataset, which reduces the error 4. Biofeatures
of the previous best methods including MBGS+SVM [110]
and APEM+FUSION [111]. Similar to Taigman et al. [49], the The biofeatures used by authentication and authorization
study by Sun et al. [50] reaches an accuracy of 99.47% on schemes for mobile IoT devices can be classified into two
the LFW dataset and 93.2% on the YTF dataset. For more types: human physiological (e.g., face, eyes, fingerprints-
information about deep learning for understanding faces, we palm, or electrocardiogram) and behavioral features (e.g.,
refer the reader to the study by Ranjan et al. [107]. signature, voice, gait, or keystroke). Table 3 presents the
The Gaithashing scheme [56] achieves EER=0% for type biometrics-based authentication schemes for mobile IoT
1 and 3 impostors (i.e., type 1 impostor uses his/her own gait devices with biofeatures used as a countermeasure.
Security and Communication Networks 9

Classifier Authen-
Enrollment
building tication
phase
phase phase
Decision to Accept or Reject
Figure 3: An authentication and authorization scheme using
keystroke dynamics for mobile IoT devices. In the enrollment
phase, users type their PINs by clicking the numeral buttons. Then,
the system verifies the user’s identity after obtaining the personal
Calculate the normalized z score features in the classifier building phase. At the authentication phase,
the system verifies the user’s identity.

Use the Gaussian mixture model


with voice model templates the form on an image as input signatures. With the
category of online, authentication and authorization
schemes use the form of time-stamped data points
Use the mel-frequency
as input signatures. With the category of behavior,
cepstral coefficients and pitch authentication and authorization schemes use the
behavior of doing signatures with a finger.
(v) Gait recognition: the gait templates can be used
for user verification. Based on the biometric cryp-
Input the voice tosystem (BCS) approach with a fuzzy commitment
scheme, Hoang et al. [74] introduced authentication
and authorization scheme using gait recognition for
Figure 2: An authentication and authorization scheme using voice
mobile IoT devices.
for mobile IoT devices.
(vi) Behavior profiling: behavior profiling aims at building
invariant features of the human behavior during
different activities. Frank et al. [24] proposed authen-
(i) Gaze gestures: by combining gaze and touch, Khamis tication and authorization scheme using a touch-
et al. [67] introduced multimodal authentication for screen input as a behavioral biometric for mobile IoT
mobile IoT devices, which is more secure than single- devices.
modal authentication against iterative attacks and (vii) Keystroke dynamics: existing keystroke-based
side attacks. authentication and authorization schemes for mobile
(ii) Electrocardiogram: electrocardiogram methods can IoT devices can be classified into two types: (1)
conceal the biometric features during authentication, static, in which the keystroke analysis is performed
which are classified as either electrocardiogram with only at specific times, and (2) continuous, in which
the fiducial features of segmented heartbeats or elec- the keystroke analysis is performed during a whole
trocardiogram with nonfiducial features as discussed session. In order to improve the effectiveness of PIN-
in [70, 71]. Both studies proved that the electrical based authentication and authorization schemes,
activity of the heart can be a candidate of biofeatures Tasia et al. [38] proposed three steps in the keystroke
for user authentication on mobile IoT devices. dynamics-based authentication systems, namely, (1)
(iii) Voice recognition: the voice signal can be used in enrollment step, (2) classifier building step, and (3)
voice authentication with a characteristic of single user authentication step, as shown in Figure 3.
vowel. Kim and Hong [25] used mel-frequency cep- (viii) Touch dynamics: the process of measuring and assess-
stral coefficients and pitch as voice features and the ing human touch rhythm on mobile IoT devices
Gaussian mixture model in the voice authentication is called touch dynamics. According to Teh et al.
process for speaker recognition, as shown in Figure 2. [17], the design of a touch dynamics authentication
Note that voice-based authentication and authoriza- system is performed in three steps, namely, (1) user
tion schemes for mobile IoT devices are vulnerable enrollment step, (2) user authentication step, and (3)
against attacks that use a prerecorded voice. data retraining step, as shown in Figure 4.
(iv) Signature recognition: according to Shahzad et al. (ix) Fingerprint: the fingerprint is used as a biokey,
[23], a signature is defined as the conventional hand- dynamically to secure a communication channel
written depiction of one’s name performed using a between client and server after successful authen-
finger. Therefore, existing signature-based authen- tication on mobile IoT devices. [79–82]. Currently,
tication and authorization schemes for mobile IoT authentication and authorization schemes use public
devices can be divided into three categories, namely, key infrastructure framework, such as elliptic curve
offline, online, and behavior. With the category of cryptography, in order to protect the fingerprint
offline, authentication and authorization schemes use biometric, as shown in Figure 5.
10 Security and Communication Networks

User User au- Data


enrollment thentication retraining

Figure 4: An authentication and authorization scheme using touch Step 3: Face detection
dynamics for mobile IoT devices. In the first phase, the touch
dynamics data are acquired, processed, and stored. In the second
phase, the system determines the similarity or dissimilarity. In the
third phase, the reference template is updated (data adaptation).
Step 2: Learning phase using SVM

Distribution of certificates
Step 1
for users and servers Step 1: Segment Clustering

Figure 6: A face-based authentication and authorization scheme


Acquire Fingerprint using the support vector machine (SVM) for mobile IoT devices.
Step 2
with extract feature In Step 1, the system applies four substeps: training images, facial
segments, clustering, and set of clusters. In Step 2, the system subset
of clusters trains an SVM classifier. In Step 3, the system applies
five substeps: clustering, a subset of clusters, statistical features,
Run the user registration
Step 3 pretrained SVM, and score.
phase with servers

Detection
Step 4 Use a cryptographic method
Iris

Segmen-
tation Iris
Figure 5: An authentication and authorization scheme using finger-
print for mobile IoT devices.

Matching
Iris
(x) Smart card: according to Li and Hwang [85], the
authentication and authorization schemes for mobile
IoT devices using smart cards are one of the simplest Feature
and the most effective schemes for IoT authentication extraction
compared to traditional password-based authentica- Iris
tion schemes. Specifically, the user inputs his/her Template
selection
personal biofeatures on mobile IoT device during the
Iris
registration step. Then, the registration center stores
the personal biofeatures on the user’s smart card. Figure 7: An authentication and authorization scheme using Iris for
(xi) Multitouch refers to the ability to sense the input mobile IoT devices.
simultaneously from more points of contact with a
touchscreen [89]. According to Sae-Bae et al. [88],
authentication and authorization schemes for mobile Mahbub et al.’s scheme is based on three steps, namely,
IoT devices using multitouch gesture are based on (1) step of segment clustering, (2) step of learning
classifying movement characteristics of the center of SVM, and (3) step of face detection, as shown in
the fingertips and the palm. Figure 6.
(xii) Graphical password: to withstand dictionary attacks, (xiv) Iris recognition: iris-based authentication scheme
researchers proposed graphical-based password refers to a comparison with the iris template of the
authentication schemes, which can be classified into person owning the mobile computing device. This
two types: (1) authentication and authorization using process could be used to unlock a mobile computing
recognition and (2) authentication and authorization device or to validate banking transactions. According
using recall. to De Marsico et al. [91], an iris-based authentication
(xiii) Face recognition: Mahbub et al. [92] introduced an scheme can be repeated in a cyclic process to ensure
authentication and authorization scheme using face continuous reidentification, as shown in Figure 7.
recognition, which can be applied for mobile IoT (xv) Rhythmic taps/slides: a rhythm-based authentication
devices. Based on the support vector machine (SVM), scheme refers to user identification by a series of
Security and Communication Networks 11

rhythmic taps/slides on a device screen. Chen et al. proposed the concept of chaotic hash-based fingerprint
[72] proposed an authentication and authorization biometrics remote user authentication scheme. Theoretically,
scheme using rhythmic taps/slides, which can be the scheme in [79] can prevent six attacks, namely, parallel
applied for mobile IoT devices. Chen et al.’s scheme is session attack, reflection attack, forgery attack, imperson-
based on two steps, namely, (1) enrollment step and ation attack, DoS attack, and server spoofing attack, but it
(2) verification step. is not tested on mobile devices and may be vulnerable to
(xvi) Capacitive touchscreen: in order to scan body parts biometric template attacks.
on mobile IoT devices, Holz et al. [96] introduced In order to avoid the biometric template attack, Xi et al.
an authentication and authorization scheme using [80] proposed an idea based on the transformation of the
the capacitive touchscreen. Specifically, Holz et al.’s locally matched fuzzy vault index to the central server for
scheme appropriates the capacitive touchscreen as an biometric authentication using the public key infrastructure.
image sensor. Compared to [79, 80, 112], Chen et al. [81] proposed an idea
that uses only hashing functions on fingerprint biometric
(xvii) Ear shape: ear shape-based authentication scheme remote authentication scheme to solve the asynchronous
refers to capturing a sequence of ear images, which are problem on mobile devices. In 2014, Khan et al. [82] improved
used for extraction of discriminant features, in order Chen et al.’s scheme and Truong et al.’s scheme with quick
to authenticate the users on mobile IoT devices [44]. wrong password detection, but location privacy is not con-
(xviii) Arm gesture: the arm gesture is usually combined sidered.
with a physical biometric to authenticate users for Biometric keys have some advantages, namely, (1) cannot
mobile IoT devices, for example, ear shape [44]. be lost, (2) very difficult to copy, (3) hard to distribute, and
(4) cannot be easily guessed. In 2010, Li and Hwang [85] pro-
posed a biometric-based remote user authentication scheme
5. Authentication and Authorization Schemes using smart cards in order to provide nonrepudiation. With-
for Mobile IoT Devices Using Biofeatures out using identity tables and storing password tables in the
authentication system, Li and Hwang’s scheme [85] can resist
The surveyed papers of authentication and authorization masquerading attacks, replay attacks, and parallel session
schemes for mobile IoT devices using biofeatures are shown attacks. Authors did not specify the application environment
in Table 4. In addition, threat models and countermeasures of their scheme, but it can be applied to mobile IoT devices as
are shown in Table 5. the network model is not too complicated. Note that Li and
The manner and rhythm in which an individual types Hwang’s scheme was cryptanalyzed for several times.
characters when writing a text message are called keystroke Touch dynamics for user authentication are initialed
analysis, which can be classified as either static or continuous. on desktop machines and finger identification applications.
For authenticating users based on the keystroke analysis, In 2012, Meng et al. [113] focused on authentication and
Clarke and Furnell [99] introduced an authentication and authorization using user behavioral biofeatures such as touch
authorization scheme, which is based on three interaction duration and touch direction. Specifically, they proposed
scenarios, namely, (1) entry of 11-digit telephone numbers, an authentication scheme that uses touch dynamics on
(2) entry of 4-digit PINs, and (3) entry of text messages. touchscreen mobile IoT devices. To classify users, Meng et
Clarke and Furnell’s scheme [99] not only can provide al.’s scheme performs an experiment with 20 users using
transparent authentication of the user but also is efficient Android touchscreen phones and applies known machine
in terms of FRR and FAR under three types of mobile learning algorithms (e.g., decision tree and naive Bayes).
IoT devices, namely, Sony Ericsson T68, HP IPAQ H5550, Through simulations, the results show that Meng et al.’s
and Sony Clie PEG NZ90. To demonstrate the ability of scheme succeeds in reducing the average error rate down to
neural network classifiers, the same authors in [100] pro- 2.92% (FAR of 2.5% and FRR of 3.34%). The question we
posed an authentication framework based on mobile handset ask here is the following: is it possible to use the multitouch
keypads in order to support keystroke analysis. The three as an authentication mechanism? Sae-Bae et al. [88] in 2012
pattern recognition approaches used in this framework are introduced an authentication approach based on multitouch
(1) feedforward multilayered perceptron network, (2) radial gestures using an application on the iPad with version 3.2 of
basis function network, and (3) generalised regression neural iOS. Compared with Meng et al.’s scheme [113], Sae-Bae et
network. Therefore, Maiorana et al. [76] proved that it is al.’s approach is efficient with 10% EER on average for single
feasible to employ keystroke dynamics on mobile phones with gestures and 5% EER on average for double gestures. Similar
the statistical classifier for keystroke recognition in order to to Sae-Bae et al.’s approach [88], Feng et al. [114] proposed an
employ it as a password-hardening mechanism. In addition, authentication and authorization scheme using multitouch
the combination of pressure and time features is proven by gesture for mobile IoT devices, named FAST, which incurs
Tasia et al. in [38] that it is among the effective solutions for FAR=4.66% and FRR=0.13% for the continuous postlogin
authentication and authorization. user authentication. In addition, the FAST scheme can
The passwords have been widely used by the remote provide a good postlogin access security, but the threat model
authentication schemes, which can be easily guessed, hacked, is very limited and privacy-preservation is not considered.
and cracked. However, to deal with the drawbacks of only- Arteaga-Falconi et al. [70] introduced the concept of
password-based remote authentication, Khan et al. [79] authentication and authorization using electrocardiogram for
12

Table 4: Biometric-based authentication schemes for mobile IoT devices.


Performance (+) and
Time Scheme Method Goal Mobile device Complexity
limitation (-)
(i) Introducing the concept + Keystroke latency
Clarke and Furnell (i) Sony Ericsson T68;
2007 (i) Keystroke analysis of advanced user - Process of continuous and Low
[99] (ii) HP IPAQ H5550
authentication nonintrusive authentication
+ GRNN has the largest
(i) Enable continuous and
Clarke and Furnell spread of performances
2007 (i) Keystroke analysis transparent identity (i) Nokia 5110 High
[100] - The threat model is not
verification
defined
+ Can prevent server
spoofing attack
(i) Introducing the chaotic
2008 Khan et al. [79] (i) Fingerprint (i) N/A - The proposed scheme is Low
hash-based fingerprint
not tested on mobile
devices
+ Can prevent parallel
(i) Providing the session attacks
2010 Li and Hwang [85] (i) Smart card (i) N/A 10𝑇𝐻
nonrepudiation - Storage costs are not
considered
+ Secure the genuine
(i) Providing the
(i) Mobile device with Java biometric feature at FAR=0.1%,
2011 Xi et al. [80] (i) Fingerprint authentication using
Platform - Server-side attack is not GAR=78.69%
biocryptographic methods
considered
+ Solve asynchronous
(i) Using only hashing problem
2012 Chen et al. [81] (i) Fingerprint (i) N/A 7𝑇𝐻
functions - Privacy-preserving is not
considered
+ Sufficient to authenticate
(i) Providing a behavioral
a user 11 to 12 strokes,
2013 Frank et al. [24] (i) Touchscreen biometric for continuous (i) Google Nexus One
- Not applicable for EER=2%–3%
authentication
long-term authentication
+ Quick wrong password
(i) Improve Chen et al.’s detection
2014 Khan et al. [82] (i) Fingerprint (i) N/A 18𝑇𝐻
scheme - Location privacy is not
considered
+ Efficient against brute
(i) Employing a fuzzy force attacks
2015 Hoang et al. [74] (i) Gait recognition (i) Google Nexus One Low
commitment scheme - Privacy model is not
defined
Security and Communication Networks
Table 4: Continued.
Performance (+) and
Time Scheme Method Goal Mobile device Complexity
limitation (-)
+ Concealing the biometric
(i) Introducing the concept features during
Arteaga-Falconi et TAR=81.82% and
2016 (i) Electrocardiogram of electrocardiogram-based (i) AliveCor authentication
al. [70] FAR=1.41%
authentication - Privacy model is not
considered
+ Implicit authentication
(i) Implicitly authenticate (i) Samsung Galaxy S4
2017 Abate et al. [44] (i) Ear shape - Process of continuous and EER=1%–1.13%
the person authentication smartphone
nonintrusive authentication
+ Secure against the side
(i) Protect multimodality attack model and the
2017 Khamis et al. [69] (i) Gaze and touch and authorization on (i) N/A iterative attack model 𝑆𝑆𝑅 = 68% 𝑡𝑜 10.4%
mobile IoT devices - Vulnerable to video
Security and Communication Networks

attacks
(i) Introducing a + Anonymity and
biometrics-based unlinkability
2017 Feng et al. [87] (i) Fingerprints or iris scans (i) Google Nexus One 𝐶1 = 8𝑇𝐸𝑚𝑢𝑙 + 24𝑇𝐻
authentication with key - Interest privacy in not
distribution considered
+ Authentication and
(i) Proposing a near-field authorization for P2P
2017 Ghosh et al. [83] (i) Fingerprint communication with (i) N/A payment High
biometric authentication - Threat model is not
defined
+ Efficient password
change
(i) Removing the drawback + Offline password 𝐶1 = 8𝑇𝐻 +
2017 Mishra et al. [101] (i) Biometric identifier (i) N/A
of Li et al.’s scheme [102] guessing 𝑇𝐸𝑒𝑛𝑐/𝑑𝑒𝑐 + 2𝑇𝐸𝑚𝑢𝑙
- Location privacy is not
considered
+ Quick detection of wrong
password
(i) Introducing three-factor
+ Traceability of mobile 𝐶1 =
2018 Li et al. [84] (i) Fingerprint authentication using (i) N/A
user 9𝑇𝐸𝑚𝑢𝑙 +2𝑇𝑒 +20𝑇𝐻
fingerprint identification
- Backward privacy is not
considered
+ High verification
(i) Introducing critical
accuracy 𝑅𝑉 =
2018 Yeh et al. [97] (i) Plantar biometrics characteristics of new (i) Raspberry PI platform
- Threat model is not 83, 88% 𝑡𝑜 99, 60%
biometrics
defined
+ The iris segmentation
(i) Use deep learning for
Bazrafkan and task on mobile IoT devices
2018 (i) Iris enhancing Iris (i) N/A 𝑆𝐴 = 99.3%
Corcoran [41] - Privacy-preserving is not
authentication
considered
TAR: true acceptance rate; FAR: false acceptance rate; FPR: false-positive rate; EER: equal error rate; GAR: genuine acceptance rate; 𝑇𝐻 : time of executing a one-way hash function; 𝑆𝑆𝑅: shoulder surfing attack
13

rate; 𝐶1 : computational cost of client and server (total); 𝑇𝐸𝑚𝑢𝑙 : time of executing an elliptic curve point multiplication; 𝑇𝐸𝑒𝑛𝑐/𝑑𝑒𝑐 : time complexity of symmetric key encryption/decryption; 𝑇𝑒 : time of executing a
bilinear pairing operation; 𝑅𝑉: accuracy ratio of entity verification; 𝑆𝐴: segmentation accuracy.
14

Table 5: Threat models and countermeasures.


Scheme Biofeature Threat model Data attacked Countermeasure
(i) Observe the user several (i) Multimodal
(i) Iterative attacks
Khamis et al. [67] Gaze gestures times from different authentication based on
(ii) Side attacks
viewpoints combining gaze and touch
(i) Shoulder surfing (i) Multimodal
(i) Uncover a user’s
Khamis et al. [68] Gaze gestures (ii) Thermal attacks authentication based on
password
(iii) Smudge attacks combining gaze and touch
(i) Adversarial machine (i) Attacking ECG data (i) ECG authentication
Arteaga-Falconi et al. [70] Electrocardiogram
learning sensors algorithm
(i) Adversarial machine (i) Attacking ECG data (i) Cross-correlation of the
Kang et al. [71] Electrocardiogram
learning sensors templates extracted
(i) Malicious bystanders try
(i) Rhythm-based
Chen et al. [72] Voice recognition (i) Random-guessing attack to observe the password of
two-factor authentication
the legitimate user
(i) Malicious bystanders try (i) Behavior-based user
(i) Shoulder surfing attack
Shahzad et al. [23] Signature recognition to observe the password of authentication using
(ii) Smudge attack
the legitimate user gestures and signatures
(i) Guess the user’s feature (i) Using the notion of
Sitova et al. [32] Behavior profiling (i) Population attacks
vector guessing distance
(i) Authentication scheme
(i) Shoulder surfing attack (i) Spying on the owner
Shahzad et al. [23] Behavior profiling based on the gesture and
(ii) Smudge attack when he performs an action
signature behavior
(i) Side attack model (i) Spying on the owner (i) Multimodal
Khamis et al. [69] Touch dynamics
(ii) Iterative attack model when he performs an action authentication
(i) Deep learning algorithm
(i) Extract the watermarked
Ferdowsi and Saad [39] N/A (i) Eavesdropping attacks with long short-term
information
memory
(i) Replay attacks, forgery
attack and impersonation (i) Replaying of an old (i) Chaotic hash-based
Khan et al. [79] Fingerprint
attack, server spoofing login message authentication
attack
Security and Communication Networks
Security and Communication Networks 15

mobile IoT devices. Specifically, the authors considered five 6.4. Adversarial Machine Learning against Biometric-Based
factors, namely, the number of electrodes, quality of mobile Authentication Schemes. Some biometric-based authentica-
ECG sensors, time required to gain access to the phone, FAR, tion mechanisms, and especially behavioral-based ones, use
and TAR. Before applying the ECG authentication algorithm, machine learning techniques for extracting features and
the preprocessing stages for the ECG signal pass by the building a classifier to verify the user’s identity. Adversarial
fiducial point detection. The ECG authentication algorithms machine learning aims to manipulate the input data to
are based on two aspects: (1) employing feature-specific exploit specific vulnerabilities of the learning algorithms. An
percentage of tolerance and (2) employing a hierarchical adversary using adversarial machine learning methods tries
validation framework. The results reveal that the algorithm to compromise biometric-based authentication schemes and
[70] has 1.41% FAR and 81.82% TAR with 4𝑠 of signal gain illegal access to the system or the mobile device. The
acquisition. Note that ECG signals from mobile IoT devices future research efforts should focus on dealing with this kind
may be affected by noise due to the type of motion and of threats.
signal acquisition, as discussed by Kang et al. [71]. However,
the advantage of using ECG authentication is concealing the 6.5. Machine Learning and Blockchain-Based Authentication.
biometric features during authentication, but it is a serious The blockchain technology is being used in different appli-
problem if privacy-preservation is not considered. cation domains beyond the cryptocurrencies, for example,
SDN, Internet of Things, and fog computing [119]. To
6. Future Directions develop a machine learning and blockchain-based solution
for authenticating mobile IoT devices, we have to take
Several challenges still remain which open interesting in mind the specific requirements of the blockchain, for
research opportunities for future work, including Doppler example, (1) when IoT data needed to be checked by the
radar, vocal resonance, mobile malware threats, and adver- IoT entities without any central authority and (2) the ledger
sarial machine learning. copies required to be synchronized across all of the IoT
entities. In addition, the vulnerabilities of the peer-to-peer
6.1. Doppler Radar. A team of researchers at Buffalo Uni- blockchain networks during the authentication need to be
versity, led by Wenyao Xu, developed a system that exploits considered, including private key leakage, double spending,
a Doppler radar capable of “reading” the human heart! It transaction privacy leakage, 51% vulnerability, and selfish and
works roughly like any other radar, emitting microwaves and reputation-based behaviors. Hence, the machine learning-
analyzing the return signal in order to detect changes in based authentication schemes using the blockchain technol-
motion [115]. As scientists say, the process of identifying a ogy should be investigated in the future.
person through the method takes about eight seconds, and
radar power is just 5 milliwatts, which means that radiation 6.6. Developing a Novel Authentication Scheme. For devel-
is not dangerous to the body. This method can be a basis for oping a novel authentication scheme for mobile IoT devices
future biometric systems that can be fast and efficient and using biofeatures, we propose the following six-step process:
recognize unique characteristics of the human body. (1) Definition of IoT network components (cloud com-
puting, fog computing, and IoT devices).
6.2. Vocal Resonance. In [116], the authors proposed using (2) Choose the threat models (e.g., iterative attacks,
vocal resonance, that is, the sound of the person’s voice, as shoulder surfing attacks, thermal attacks, smudge
it travels through the person’s body. Vocal resonance can be attacks, and eavesdropping attacks).
used as a passive biometric, and it achieves high accuracy
(3) Choose the biofeatures (e.g., face, eyes, fingerprints-
in terms of identification and verification problems. It is a
palm, electrocardiogram, signature, voice, gait, and
method that is suitable for devices worn on the chest or keystroke).
neck or initially but could also be used in the near future for
recognizing any device that a user possesses. (4) Choose the machine learning and data mining meth-
ods (unsupervised, semisupervised, or supervised).
6.3. Mobile Malware Threats against Biometric Reference (5) Proposition of the main steps (e.g., enrollment steps,
Template. In 2016 [117, 118], an Android malware succeeded classifier building step, and user authentication step).
in bypassing the two-factor authentication scheme of many (6) Evaluating the scheme’s performance using classifica-
banking mobile applications that are installed on the user’s tion metrics, including TAR, FAR, FPR, and EER.
mobile device. The malware can intercept two-factor authen-
tication code (i.e., verification code sent through SMS) 7. Discussion
and forward it to the attacker. In case of biometric-based
authentication, this threat can be evolved to access the There is a big discussion regarding the use of biometric
biometric reference template, which is stored at the mobile characteristics of the users from new systems or technologies.
device, and send it to the attacker. One research direction to Biometric technology can be used to protect privacy, since
prevent this kind of attacks is to employ policy-enforcement only a minimum amount of information is required to
access control mechanisms that are appropriate for resource- determine whether someone is authorized, for example, to
constrained mobile devices. enter a specific area. On the other hand, since biometrics
16 Security and Communication Networks

can reveal sensitive information about a person, controlling References


the usage of information may be tricky, especially now that
the technology has reached the stage of being applied in [1] L. A. Maglaras, K.-H. Kim, H. Janicke et al., “Cyber security
of critical infrastructures,” ICT Express, vol. 4, no. 1, pp. 42–45,
mobile devices which can be easily lost or stolen [120].
2018.
Those who are against the use of such features raise concerns
[2] J. Sanchez del Rio, D. Moctezuma, C. Conde, I. Martin de Diego,
about how these data are going to be used. These concerns
and E. Cabello, “Automated border control e-gates and facial
could be mitigated by making it clear to people that their recognition systems,” Computers & Security, vol. 62, pp. 49–72,
data is only stored for a limited time and explaining who 2016.
will process this data and for what purposes [121]. To that [3] P. Vinkel and R. Krimmer, “The how and why to internet
sense, the General Data Protection Regulation (GDPR) for voting an attempt to explain e-stonia,” in Proceedings of the
European Member States addresses biometric data storage International Joint Conference on Electronic Voting, vol. 10141,
and processes in terms of data protection and privacy. EU pp. 178–191, Springer.
countries are affected, including the UK and all companies [4] D. Springall, T. Finkenauer, Z. Durumeric et al., “Security
that store or process data of EU citizens. On the other hand, in analysis of the estonian internet voting system,” in Proceedings
the United States, there is no single comprehensive federal law of the 21st ACM Conference on Computer and Communications
regulating the collection and processing of biometric data. Security, CCS 2014, pp. 703–715, ACM, 2014.
Only three states, Washington, Texas, and Illinois, have a [5] R. Sen and S. Borle, “Estimating the contextual risk of data
biometric privacy law despite the fact that US regulators are breach: an empirical approach,” Journal of Management Infor-
also increasingly focusing on the protection of biometric data. mation Systems, vol. 32, no. 2, pp. 314–341, 2015.
Moreover, in August 2017, India’s supreme court decision [6] “United biometrics,” http://unitedbiometrics.com/, [accessed:
about a landmark case that named privacy a “fundamental 2018-30-11].
right” showcased that biometric data protection is top on [7] M. A. Ferrag, L. Maglaras, A. Derhab, and A. A. Korba, “Tax-
regulators’ agenda. onomy of biometric-based authentication schemes for mobile
computing devices,” in Proceedings of the 2018 3rd International
Except from data use issues, general terms such as Conference on Pattern Analysis and Intelligent Systems (PAIS),
computer fear and technophobia also provide established pp. 1–8, IEEE, 2018.
accounts of individuals’ resistance to using new and unfa- [8] D. Gafurov, “A survey of biometric gait recognition: Approaches,
miliar information technologies, especially for elder people security and challenges,” in Proceedings of the Annual Norwe-
[122]. Moving one step further, companies that produce gian computer science conference, pp. 19–21, 2007.
applications or methods that use biometric characteristics [9] K. Revett, H. Jahankhani, S. T. de Magalhães, and H. M. Santos,
must comply with a code of ethics or a consistent legal “A survey of user authentication based on mouse dynamics,” in
framework governing this kind of data collection, which is Global E-Security, vol. 12, pp. 210–219, Springer, 2008.
still absent. For that reason, IEEE P7000 is the first standard [10] R. V. Yampolskiy and V. Govindaraju, “Behavioural biometrics:
IEEE ever going to publish on ethical issues in system design a survey and classification,” International Journal of Biometrics,
in the next couple of years [123]. vol. 1, no. 1, pp. 81–113, 2008.
[11] D. Shanmugapriya and G. Padmavathi, A survey of biometric
keystroke dynamics: Approaches, security and challenges, 2009,
8. Conclusion https://arxiv.org/abs/0910.0817.
In this article, we have presented a comprehensive literature [12] M. Karnan, M. Akila, and N. Krishnaraj, “Biometric personal
review, focusing on authentication and authorization for authentication using keystroke dynamics: A review,” Applied
Soft Computing, vol. 11, no. 2, pp. 1565–1573, 2011.
mobile IoT devices using biofeatures, which were published
[13] S. P. Banerjee and D. Woodard, “Biometric authentication and
between 2007 and 2018. We presented the machine learning identification using keystroke dynamics: a survey,” Journal of
and data mining algorithms used by authentication and Pattern Recognition Research, vol. 7, no. 1, pp. 116–139, 2012.
authorization schemes for mobile IoT devices, including [14] P. S. Teh, A. B. J. Teoh, and S. Yue, “A survey of keystroke
unsupervised, semisupervised, and supervised approaches. dynamics biometrics,” The Scientific World Journal, vol. 2013,
We reviewed all the biofeatures used by authentication and Article ID 408280, 24 pages, 2013.
authorization schemes for mobile IoT devices. We presented [15] S. Bhatt and T. Santhanam, “Keystroke dynamics for biometric
the pitfalls and limitations of the existing authentication authentication-a survey,” in Proceedings of the International
and authorization schemes for mobile IoT devices. Several Conference on Pattern Recognition, Informatics and Mobile Engi-
challenging research areas (e.g., Doppler radar, vocal reso- neering (PRIME), pp. 17–23, IEEE, 2013.
nance, mobile malware threats, adversarial machine learning, [16] W. Meng, D. S. Wong, S. Furnell, and J. Zhou, “Surveying
the development of biometric user authentication on mobile
machine learning, and blockchain-based authentication) will
phones,” IEEE Communications Surveys & Tutorials, vol. 17, no.
open doors for possible future research directions for mobile 3, pp. 1268–1293, 2015.
IoT devices. [17] P. S. Teh, N. Zhang, A. B. J. Teoh, and K. Chen, “A survey on
touch dynamics authentication in mobile devices,” Computers
Conflicts of Interest & Security, vol. 59, pp. 210–235, 2016.
[18] A. Mahfouz, T. M. Mahmoud, and A. S. Eldin, “A survey on
The authors declare that there are no conflicts of interest behavioral biometric authentication on smartphones,” Journal
regarding the publication of this paper. of Information Security and Applications, vol. 37, pp. 28–37, 2017.
Security and Communication Networks 17

[19] N. A. Mahadi, M. A. Mohamed, A. I. Mohamad, M. Makhtar, M. [34] H. Gunasinghe and E. Bertino, “PrivBioMTAuth: privacy pre-
F. A. Kadir, and M. Mamat, “A survey of machine learning tech- serving biometrics-based and user centric protocol for user
niques for behavioral-based biometric user authentication,” in authentication from mobile phones,” IEEE Transactions on
Recent Advances in Cryptography and Network Security, Inte- Information Forensics and Security, vol. 13, no. 4, pp. 1042–1057,
chOpen, 2018. 2018.
[20] K. Sundararajan and D. L. Woodard, “Deep learning for [35] K. O. Bailey, J. S. Okolica, and G. L. Peterson, “User iden-
biometrics: a survey,” ACM Computing Surveys (CSUR), vol. 51, tification and authentication using multi-modal behavioral
no. 3, p. 65, 2018. biometrics,” Computers & Security, vol. 43, pp. 77–89, 2014.
[21] A. Rattani and R. Derakhshani, “A survey of mobile face [36] L. Fridman, A. Stolerman, S. Acharya et al., “Multi-modal
biometrics,” Computers and Electrical Engineering, vol. 72, pp. decision fusion for continuous authentication,” Computers and
39–52, 2018. Electrical Engineering, vol. 41, no. C, pp. 142–156, 2015.
[22] V. M. Patel, R. Chellappa, D. Chandra, and B. Barbello, “Contin- [37] N. Zheng, A. Paloski, and H. Wang, “An efficient user verifica-
uous user authentication on mobile devices: recent progress and tion system via mouse movements,” in Proceedings of the 18th
remaining challenges,” IEEE Signal Processing Magazine, vol. 33, ACM Conference on Computer and Communications Security,
no. 4, pp. 49–61, 2016. pp. 139–150, ACM, 2011.
[23] M. Shahzad, A. X. Liu, and A. Samuel, “Behavior based human [38] C.-J. Tasia, T.-Y. Chang, P.-C. Cheng, and J.-H. Lin, “Two
authentication on touch screen devices using gestures and novel biometric features in keystroke dynamics authentication
signatures,” IEEE Transactions on Mobile Computing, vol. 16, no. systems for touch screen devices,” Security and Communication
10, pp. 2726–2741, 2017. Networks, vol. 7, no. 4, pp. 750–758, 2014.
[24] M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touch- [39] A. Ferdowsi and W. Saad, “Deep learning-based dynamic
alytics: on the applicability of touchscreen input as a behavioral watermarking for secure signal authentication in the internet of
biometric for continuous authentication,” IEEE Transactions on things,” in Proceedings of the 2018 IEEE International Conference
Information Forensics and Security, vol. 8, no. 1, pp. 136–148, on Communications (ICC 2018), pp. 1–6, IEEE, 2018.
2013.
[40] R. Das, A. Gadre, S. Zhang, S. Kumar, and J. M. Moura, “A deep
[25] D.-J. Kim and K.-S. Hong, “Multimodal biometric authentica- learning approach to iot authentication,” in Proceedings of the
tion using teeth image and voice in mobile environment,” IEEE 2018 IEEE International Conference on Communications (ICC
Transactions on Consumer Electronics, vol. 54, no. 4, pp. 1790– 2018), pp. 1–6, IEEE, 2018.
1797, 2008.
[41] S. Bazrafkan and P. Corcoran, “Enhancing iris authentication
[26] C. Lin, C. Chang, and D. Liang, “A new non-intrusive authenti- on handheld devices using deep learning derived segmentation
cation approach for data protection based on mouse dynamics,” techniques,” in Proceedings of the 2018 IEEE International
in Proceedings of the 2012 International Symposium on Biomet- Conference on Consumer Electronics (ICCE), pp. 1-2, IEEE, 2018.
rics and Security Technologies (ISBAST), pp. 9–14, IEEE, 2012.
[42] B. Bayar and M. C. Stamm, “A deep learning approach to uni-
[27] C. Shen, Z. Cai, and X. Guan, “Continuous authentication for versal image manipulation detection using a new convolutional
mouse dynamics: A pattern-growth approach,” in Proceedings of layer,” in Proceedings of the 4th ACM Workshop on Information
the Dependable Systems and Networks (DSN), 2012 42nd Annual Hiding and Multimedia Security, pp. 5–10, ACM, 2016.
IEEE/IFIP International Conference on, pp. 1–12, IEEE, 2012.
[43] M. Alhussein and G. Muhammad, “Voice pathology detection
[28] H. Jagadeesan and M. S. Hsiao, “A novel approach to design
using deep learning on mobile healthcare framework,” IEEE
of user re-authentication systems,” in Proceedings of the 2009
Access, vol. 6, pp. 41034–41041, 2018.
IEEE 3rd International Conference on Biometrics: Theory, Appli-
cations, and Systems (BTAS), pp. 1–6, IEEE, 2009. [44] A. F. Abate, M. Nappi, and S. Ricciardi, “I-Am: implicitly
authenticate me person authentication on mobile devices
[29] A. Buriro, B. Crispo, and M. Conti, “AnswerAuth: A bimodal
through ear shape and arm gesture,” IEEE Transactions on
behavioral biometric-based user authentication scheme for
Systems, Man, and Cybernetics: Systems, pp. 1–13, 2017.
smartphones,” Journal of Information Security and Applications,
vol. 44, pp. 89–103, 2019. [45] Z. Yan and S. Zhao, “A usable authentication system based on
[30] J. V. Monaco, N. Bakelman, S.-H. Cha, and C. C. Tappert, personal voice challenge,” in Proceedings of the 2016 Interna-
“Recent advances in the development of a long-text-input tional Conference on Advanced Cloud and Big Data (CBD), pp.
keystroke biometric authentication system for arbitrary text 194–199, IEEE, 2016.
input,” in Proceedings of the 2013 4th European Intelligence and [46] V. Yano, A. Zimmer, and L. L. Ling, “Extraction and application
Security Informatics Conference, EISIC 2013, pp. 60–66, 2013. of dynamic pupillometry features for biometric authentication,”
[31] J. C. Stewart, J. V. Monaco, S. Cha, and C. C. Tappert, “An inves- Measurement, vol. 63, pp. 41–48, 2015.
tigation of keystroke and stylometry traits for authenticating [47] K. Annapurani, M. A. K. Sadiq, and C. Malathy, “Fusion of
online test takers,” in Proceedings of the 2011 IEEE International shape of the ear and tragus - A unique feature extraction meth-
Joint Conference on Biometrics (IJCB), pp. 1–7, 2011. od for ear authentication system,” Expert Systems with Applica-
[32] Z. Sitova, J. Sedenka, Q. Yang et al., “HMOG: new behavioral tions, vol. 42, no. 1, pp. 649–656, 2015.
biometric features for continuous authentication of smartphone [48] Y. Liu, J. Ling, Z. Liu, J. Shen, and C. Gao, “Finger vein secure
users,” IEEE Transactions on Information Forensics and Security, biometric template generation based on deep learning,” Soft
vol. 11, no. 5, pp. 877–892, 2016. Computing, vol. 22, no. 7, pp. 2257–2265, 2018.
[33] S. Sarkar, V. M. Patel, and R. Chellappa, “Deep feature-based [49] Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “DeepFace: clos-
face detection on mobile devices,” in Proceedings of the 2016 ing the gap to human-level performance in face verification,” in
IEEE International Conference on Identity, Security and Behavior Proceedings of the 27th IEEE Conference on Computer Vision and
Analysis (ISBA), pp. 1–8, IEEE, 2016. Pattern Recognition (CVPR ’14), 2014.
18 Security and Communication Networks

[50] Y. Sun, X. Wang, and X. Tang, “Deeply learned face representa- [67] M. Khamis, F. Alt, M. Hassib, E. von Zezschwitz, R. Hasholzner,
tions are sparse, selective, and robust,” in Proceedings of the IEEE and A. Bulling, “GazeTouchPass,” in Proceedings of the 2016 CHI
Conference on Computer Vision and Pattern Recognition (CVPR Conference Extended Abstracts, pp. 2156–2164, ACM Press, New
’15), 2015. York, NY, USA, 2016.
[51] A. Rattani, N. Reddy, and R. Derakhshani, “Multi-biometric [68] M. Khamis, R. Hasholzner, A. Bulling, and F. Alt, “GTmoPass,”
convolutional neural networks for mobile user authentication,” in Proceedings of the the 6th ACM International Symposium, pp.
in Proceedings of the 2018 IEEE International Symposium on 1–9, ACM Press, New York, NY, USA, 2017.
Technologies for Homeland Security (HST), pp. 1–6, IEEE, 2018. [69] M. Khamis, M. Hassib, E. Von Zezschwitz, A. Bulling, and F. Alt,
[52] A. B. Khalifa, S. Gazzah, and N. E. B. Amara, Multimodal “GazeTouchPIN: Protecting sensitive data on mobile devices
biometric authentication using choquet integral and genetic algo- using secure multimodal authentication,” in Proceedings of the
rithm, arXiv, 1804.00528, 2018, https://arxiv.org/abs/1804.00528. 19th ACM International Conference on Multimodal Interaction,
[53] A. A. Ahmed and I. Traore, “Biometric recognition based on ICMI 2017, pp. 446–450, ACM Press, New York, NY, USA, 2017.
free-text keystroke dynamics,” IEEE Transactions on Cybernet- [70] J. S. Arteaga-Falconi, H. Al Osman, and A. El Saddik, “ECG
ics, vol. 44, no. 4, pp. 458–472, 2014. authentication for mobile devices,” IEEE Transactions on Instru-
[54] A. A. Ahmed and I. Traore, “A new biometric technology based mentation and Measurement, vol. 65, no. 3, pp. 591–600, 2016.
on mouse dynamics,” IEEE Transactions on Dependable and [71] S. J. Kang, S. Y. Lee, H. I. Cho, and H. Park, “ECG authentication
Secure Computing, vol. 4, no. 3, pp. 165–179, 2007. system design based on signal analysis in mobile and wearable
[55] O. Alpar, “Frequency spectrograms for biometric keystroke devices,” IEEE Signal Processing Letters, vol. 23, no. 6, pp. 805–
authentication using neural network based classifier,” 808, 2016.
Knowledge-Based Systems, vol. 116, pp. 163–171, 2017. [72] Y. Chen, J. Sun, R. Zhang, and Y. Zhang, “Your song your
[56] C. Ntantogian, S. Malliaros, and C. Xenakis, “Gaithashing: way: Rhythm-based two-factor authentication for multi-touch
a two-factor authentication scheme based on gait features,” mobile devices,” in Proceedings of the IEEE INFOCOM 2015 -
Computers & Security, vol. 52, pp. 17–32, 2015. IEEE Conference on Computer Communications, pp. 2686–2694,
[57] H. Gamboa, A. L. N. Fred, and A. K. Jain, “Webbiometrics: IEEE, 2015.
User verification via web interaction,” in Proceedings of the 2007 [73] Z. Ali, M. S. Hossain, G. Muhammad, I. Ullah, H. Abachi, and A.
Biometrics Symposium, BSYM, pp. 1–6, 2007. Alamri, “Edge-centric multimodal authentication system using
[58] Y. Cai, H. Jiang, D. Chen, and M. Huang, “Online learning clas- encrypted biometric templates,” Future Generation Computer
sifier based behavioral biometrie authentication,” in Proceedings Systems, vol. 85, pp. 76–87, 2018.
of the 2018 IEEE 15th International Conference on Wearable and [74] T. Hoang, D. Choi, and T. Nguyen, “Gait authentication on
Implantable Body Sensor Networks (BSN), pp. 62–65, IEEE, 2018. mobile phone using biometric cryptosystem and fuzzy commit-
[59] C. Feher, Y. Elovici, R. Moskovitch, L. Rokach, and A. Schclar, ment scheme,” International Journal of Information Security, vol.
“User identity verification via mouse dynamics,” Information 14, no. 6, pp. 549–560, 2015.
Sciences, vol. 201, pp. 19–36, 2012. [75] Y. Yang and J. Sun, “Energy-efficient W-layer for behavior-
[60] S. M. Furnell, J. P. Morrissey, P. W. Sanders, and C. T. Stockel, based implicit authentication on mobile devices,” in Proceedings
Applications of Keystroke Analysis for Improved Login Security of the IEEE INFOCOM 2017 - IEEE Conference on Computer
and Continuous User Authentication, Springer, Boston, MA, Communications, pp. 1–9, Atlanta, GA, USA, 2017.
USA, 1996. [76] E. Maiorana, P. Campisi, N. González-Carballo, and A. Neri,
[61] Y. Sheng, V. V. Phoha, and S. M. Rovnyak, “A parallel decision “Keystroke dynamics authentication for mobile phones,” in
tree-based method for user authentication based on keystroke Proceedings of the 2011 ACM Symp. Appl. Comput. - SAC ’11, p.
patterns,” IEEE Transactions on Systems, Man, and Cybernetics, 21, ACM Press, New York, NY, USA, 2011.
Part B: Cybernetics, vol. 35, no. 4, pp. 826–833, 2005. [77] S.-S. Hwang, S. Cho, and S. Park, “Keystroke dynamics-based
[62] A. Kumar, M. Hanmandlu, and H. M. Gupta, “Fuzzy binary authentication for mobile devices,” Computers & Security, vol.
decision tree for biometric based personal authentication,” 28, no. 1-2, pp. 85–93, 2009.
Neurocomputing, vol. 99, pp. 87–97, 2013. [78] S. Mondal and P. Bours, “A study on continuous authentication
[63] Y. Nakkabi, I. Traore, and A. A. E. Ahmed, “Improving mouse using a combination of keystroke and mouse biometrics,”
dynamics biometric performance using variance reduction via Neurocomputing, vol. 230, pp. 1–22, 2017.
extractors with separate features,” IEEE Transactions on Systems, [79] M. K. Khan, J. Zhang, and X. Wang, “Chaotic hash-based
Man, and Cybernetics: Systems, vol. 40, no. 6, pp. 1345–1353, fingerprint biometric remote user authentication scheme on
2010. mobile devices,” Chaos, Solitons & Fractals, vol. 35, no. 3, pp.
[64] I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. 519–524, 2008.
Lai, “Combining mouse and keystroke dynamics biometrics for [80] K. Xi, T. Ahmad, F. Han, and J. Hu, “A fingerprint based
risk-based authentication in web environments,” in Proceedings bio-cryptographic security protocol designed for client/server
of the 4th International Conference on Digital Home, ICDH 2012, authentication in mobile computing environment,” Security and
pp. 138–145, IEEE, 2012. Communication Networks, vol. 4, no. 5, pp. 487–499, 2011.
[65] S. H. Khan, M. Ali Akbar, F. Shahzad, M. Farooq, and Z. Khan, [81] C.-L. Chen, C.-C. Lee, and C.-Y. Hsu, “Mobile device integra-
“Secure biometric template generation for multi-factor authen- tion of a fingerprint biometric remote authentication scheme,”
tication,” Pattern Recognition, vol. 48, no. 2, pp. 458–472, 2015. International Journal of Communication Systems, vol. 25, no. 5,
[66] W. Louis, M. Komeili, and D. Hatzinakos, “Continuous authen- pp. 585–597, 2012.
tication using One-Dimensional Multi-Resolution Local Binary [82] M. K. Khan, S. Kumari, and M. K. Gupta, “More efficient key-
Patterns (1DMRLBP) in ECG biometrics,” IEEE Transactions on hash based fingerprint remote authentication scheme using
Information Forensics and Security, vol. 11, no. 12, pp. 2818–2832, mobile device,” Computing: Archives for Scientific Computing,
2016. vol. 96, no. 9, pp. 793–816, 2014.
Security and Communication Networks 19

[83] S. Ghosh, A. Majumder, J. Goswami, A. Kumar, S. P. Mohanty, [99] N. L. Clarke and S. M. Furnell, “Advanced user authentication
and B. K. Bhattacharyya, “Swing-pay: one card meets all user for mobile devices,” Computers & Security, vol. 26, no. 2, pp.
payment and identity needs: a digital card module using nfc 109–119, 2007.
and biometric authentication for peer-to-peer payment,” IEEE [100] N. L. Clarke and S. M. Furnell, “Authenticating mobile phone
Consumer Electronics Magazine, vol. 6, no. 1, pp. 82–93, 2017. users using keystroke analysis,” International Journal of Infor-
[84] X. Li, J. Niu, S. Kumari, F. Wu, and K.-K. R. Choo, “A robust mation Security, vol. 6, no. 1, pp. 1–14, 2007.
biometrics based three-factor authentication scheme for Global [101] D. Mishra, S. Kumari, M. Khan, and S. Mukhopadhyay, “An
Mobility Networks in smart city,” Future Generation Computer anonymous biometric-based remote user-authenticated key
Systems, vol. 83, pp. 607–618, 2018. agreement scheme for multimedia systems,” International Jour-
[85] C.-T. Li and M.-S. Hwang, “An efficient biometrics-based nal of Communication Systems, vol. 30, no. 1, Article ID e2946,
remote user authentication scheme using smart cards,” Journal 2017.
of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, [102] X. Li, J. Niu, M. K. Khan, J. Liao, and X. Zhao, “Robust three-
2010. factor remote user authentication scheme with key agreement
[86] D.-J. He, M.-D. Ma, Y. Zhang, C. Chen, and J.-J. Bu, “A for multimedia systems,” Security and Communication Net-
strong user authentication scheme with smart cards for wireless works, vol. 9, no. 13, pp. 1916–1927, 2016.
communications,” Computer Communications, vol. 34, no. 3, pp. [103] M. Alizadeh, S. Abolfazli, M. Zamani, S. Baaaharun, and K.
367–374, 2011. Sakurai, “Authentication in mobile cloud computing: A survey,”
[87] Q. Feng, D. He, S. Zeadally, and H. Wang, “Anonymous Journal of Network and Computer Applications, vol. 61, pp. 59–
biometrics-based authentication scheme with key distribution 80, 2016.
for mobile multi-server environment,” Future Generation Com- [104] M. U. Aslam, A. Derhab, K. Saleem et al., “A survey of authen-
puter Systems, vol. 84, pp. 239–251, 2018. tication schemes in telecare medicine information systems,”
[88] N. Sae-Bae, K. Ahmed, K. Isbister, and N. Memon, “Biometric- Journal of Medical Systems, vol. 41, no. 1, p. 14, 2017.
rich gestures,” in Proceedings of the 2012 ACM Annu. Conf. Hum. [105] D. Kunda and M. Chishimba, “A survey of android mobile
Factors Comput. Syst. - CHI ’12, p. 977, ACM Press, New York, phone authentication schemes,” Mobile Networks and Applica-
NY, USA, 2012. tions, pp. 1–9, 2018.
[89] J. Sun, R. Zhang, J. Zhang, and Y. Zhang, “TouchIn: Sightless [106] Y.-P. Liao and C.-M. Hsiao, “A novel multi-server remote
two-factor authentication on multi-touch mobile devices,” in user authentication scheme using self-certified public keys for
Proceedings of the 2014 IEEE Conference on Communications mobile clients,” Future Generation Computer Systems, vol. 29,
and Network Security (CNS), pp. 436–444, IEEE, 2014. no. 3, pp. 886–900, 2013.
[90] T.-Y. Chang, C.-J. Tsai, and J.-H. Lin, “A graphical-based [107] R. Ranjan, S. Sankaranarayanan, A. Bansal et al., “Deep learning
password keystroke dynamic authentication system for touch for understanding faces: machines may be just as good, or better,
screen handheld mobile devices,” The Journal of Systems and than humans,” IEEE Signal Processing Magazine, vol. 35, no. 1,
Software, vol. 85, no. 5, pp. 1157–1165, 2012. pp. 66–83, 2018.
[91] M. De Marsico, C. Galdi, M. Nappi, and D. Riccio, “FIRME: Face [108] H. J. Patel, M. A. Temple, and R. O. Baldwin, “Improving
and iris recognition for mobile engagement,” Image and Vision ZigBee device network authentication using ensemble decision
Computing, vol. 32, no. 12, pp. 1161–1172, 2014. tree classifiers with radio frequency distinct native attribute
[92] U. Mahbub, V. M. Patel, D. Chandra, B. Barbello, and R. Chel- fingerprinting,” IEEE Transactions on Reliability, vol. 64, no. 1,
lappa, “Partial face detection for continuous authentication,” in pp. 221–233, 2015.
Proceedings of the 2016 IEEE International Conference on Image [109] H. Gascon, S. Uellenbeck, C. Wolf, and K. Rieck, “Continuous
Processing (ICIP), pp. 2991–2995, IEEE, 2016. authentication on mobile devices by analysis of typing motion
[93] E. Vazquez-Fernandez and D. Gonzalez-Jimenez, “Face recog- behavior,” Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit,
nition for authentication on mobile devices,” Image and Vision 2014.
Computing, vol. 55, pp. 31–33, 2016. [110] L. Wolf and N. Levy, “The SVM-minus similarity score for video
[94] D. Gragnaniello, C. Sansone, and L. Verdoliva, “Iris liveness face recognition,” in Proceedings of the 26th IEEE Conference on
detection for mobile devices based on local descriptors,” Pattern Computer Vision and Pattern Recognition, CVPR 2013, pp. 3523–
Recognition Letters, vol. 57, pp. 81–87, 2015. 3530, USA, June 2013.
[95] C. Galdi, M. Nappi, and J.-L. Dugelay, “Multimodal authentica- [111] H. Li, G. Hua, Z. Lin, J. Brandt, and J. Yang, “Probabilistic elastic
tion on smartphones: combining iris and sensor recognition for matching for pose variant face verification,” in Proceedings of the
a double check of user identity,” Pattern Recognition Letters, vol. IEEE Conference on Computer Vision and Pattern Recognition
82, pp. 144–153, 2016. (CVPR), 2013.
[96] C. Holz, S. Buthpitiya, and M. Knaust, “Bodyprint: Biometric [112] H.-A. Park, J. W. Hong, J. H. Park, J. Zhan, and D. H. Lee,
user identification on mobile devices using the capacitive “Combined authentication-based multilevel access control in
touchscreen to scan body part,” in Proceedings of the Proc. 33rd mobile application for dailylifeservice,” IEEE Transactions on
Annu. ACM Conf. Hum. Factors Comput. Syst. - CHI ’15, pp. Mobile Computing, vol. 9, no. 6, pp. 824–837, 2010.
3011–3014, ACM Press, New York, NY, USA, 2015. [113] Y. Meng, D. S. Wong, R. Schlegel, and L. Kwok, “Touch gestures
[97] K.-H. Yeh, C. Su, W. Chiu, and L. Zhou, “I walk, therefore i am: based biometric authentication scheme for touchscreen mobile
continuous user authentication with plantar biometrics,” IEEE phones,” in Proceedings of the Int. Conf. Inf. Secur. Cryptol, vol.
Communications Magazine, vol. 56, no. 2, pp. 150–157, 2018. 7763, pp. 331–350, Springer, Berlin, Heidelberg, Germany, 2013.
[98] P. Gupta and P. Gupta, “Multibiometric authentication system [114] T. Feng, Z. Liu, K. Kwon et al., “Continuous mobile authentica-
using slap fingerprints, palm dorsal vein, and hand geometry,” tion using touchscreen gestures,” in Proceedings of the 2012 IEEE
IEEE Transactions on Industrial Electronics, vol. 65, no. 12, pp. International Conference on Technologies for Homeland Security
9777–9784, 2018. (HST), pp. 451–456, IEEE, 2012.
20 Security and Communication Networks

[115] F. Lin, C. Song, Y. Zhuang, W. Xu, C. Li, and K. Ren, “Cardiac


scan: A non-contact and continuous heart-based user authenti-
cation system,” in Proceedings of the 23rd Annual International
Conference on Mobile Computing and Networking, pp. 315–328,
ACM, 2017.
[116] R. Liu, C. Cornelius, R. Rawassizadeh, R. Peterson, and D.
Kotz, “Vocal resonance: Using internal body voice for wearable
authentication,” Proceedings of the ACM on Interactive, Mobile,
Wearable and Ubiquitous Technologies, vol. 2, no. 1, p. 1, 2018.
[117] “Android malware defeats two-factor authentication,” https://
www.welivesecurity.com/2016/03/09/android-trojan-targets-
online-banking-users/.
[118] “Android banking trojan masquerades as flash player and
bypasses 2fa,” https://thestack.com/security/2016/01/18/android-
malware-defeats-two-factor-authentication/.
[119] M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L.
Maglaras, and H. Janicke, “Blockchain technologies for the
internet of things: research issues and challenges,” IEEE Internet
of Things Journal, 2018.
[120] L. Royakkers, J. Timmer, L. Kool, and R. van Est, “Societal and
ethical issues of digitization,” Ethics and Information Technol-
ogy, vol. 20, no. 2, pp. 127–142, 2018.
[121] A.-M. Oostveen, “Non-use of automated border control sys-
tems: Identifying reasons and solutions,” in Proceedings of the
28th International BCS Human Computer Interaction Confer-
ence: Sand, Sea and Sky - Holiday HCI, HCI 2014, pp. 228–233,
UK, September 2014.
[122] N. Selwyn, “Apart from technology: Understanding people’s
non-use of information and communication technologies in
everyday life,” Technology in Society, vol. 25, no. 1, pp. 99–116,
2003.
[123] S. Spiekermann, “IEEE P7000—the first global standard process
for addressing ethical concerns in system design,” Multidisci-
plinary Digital Publishing Institute Proceedings, vol. 1, no. 3, p.
159, 2017.
International Journal of

Rotating Advances in
Machinery Multimedia

The Scientific
Engineering
Journal of
Journal of

Hindawi
World Journal
Hindawi Publishing Corporation Hindawi
Sensors
Hindawi Hindawi
www.hindawi.com Volume 2018 http://www.hindawi.com
www.hindawi.com Volume 2018
2013 www.hindawi.com Volume 2018 www.hindawi.com Volume 2018 www.hindawi.com Volume 2018

Journal of

Control Science
and Engineering

Advances in
Civil Engineering
Hindawi Hindawi
www.hindawi.com Volume 2018 www.hindawi.com Volume 2018

Submit your manuscripts at


www.hindawi.com

Journal of
Journal of Electrical and Computer
Robotics
Hindawi
Engineering
Hindawi
www.hindawi.com Volume 2018 www.hindawi.com Volume 2018

VLSI Design
Advances in
OptoElectronics
International Journal of

International Journal of
Modelling &
Simulation
Aerospace
Hindawi Volume 2018
Navigation and
Observation
Hindawi
www.hindawi.com Volume 2018
in Engineering
Hindawi
www.hindawi.com Volume 2018
Engineering
Hindawi
www.hindawi.com Volume 2018
Hindawi
www.hindawi.com www.hindawi.com Volume 2018

International Journal of
International Journal of Antennas and Active and Passive Advances in
Chemical Engineering Propagation Electronic Components Shock and Vibration Acoustics and Vibration
Hindawi Hindawi Hindawi Hindawi Hindawi
www.hindawi.com Volume 2018 www.hindawi.com Volume 2018 www.hindawi.com Volume 2018 www.hindawi.com Volume 2018 www.hindawi.com Volume 2018

You might also like