Synonyms
Definitions
Continuous authentication consists of repeatedly authenticating the subject identity end-to-end during a computing session. Continuous authentication can be active or passive.
Passive continuous authentication consists of authenticating the subject unobtrusively by keeping the authentication medium transparent to the subject.
Active continuous authentication engages the subject in the authentication process. The subject is prompted periodically to participate in the authentication process by providing the authentication information or performing some tasks that will generate the required authentication data.
Background
Authentication represents indisputably one of the most important security mechanisms available in digital systems. Important services such as authorization and access control schemes rely on the ability of the authentication services to verify the identity of subjects requesting access to protected services. Traditionally,...
References
Baldini G, Geib F, Giuliani R (2019) Continuous authentication of automotive vehicles using inertial measurement units. Sensors 19:5283. https://doi.org/10.3390/s19235283
Chuang YH, Lo NW, Yang CY, Tang SW (2018) A lightweight continuous authentication protocol for the internet of things. Sensors 18:1104. https://doi.org/10.3390/s18041104
Crouse D, Han H, Chandra D, Barbello B, Jain A (2015) Continuous authentication of mobile user: fusion of face image and inertial measurement unit data. https://doi.org/10.1109/ICB.2015.7139043
Mondal S, Bours P (2015) Continuous authentication in a real world settings. https://doi.org/10.1109/ICAPR.2015.7050673
Murmuria R, Stavrou A, Barbara D, Fleck D (2015) Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users, vol 9404, pp 405–424. https://doi.org/10.1007/978-3-319-26362-5_19
Nakayama F, Lenz P, Banou S, Nogueira M, Santos A, Chowdhury KR (2019) A continuous user authentication system based on galvanic coupling communication for s-Health. Hindawi Wirel Commun Mobile Comput 2019:1–11
SitovĂ¡ Z, Sedenka J, Yang Q, Peng G, Zhou G, Gasti P, Balagani K (2015) HMOG: new behavioral biometric features for continuous authentication of smartphone users. IEEE Trans Inf Forensics Secur 11:1–1. https://doi.org/10.1109/TIFS.2015.2506542
Traore I, Ahmed AE (2012) Continuous authentication using biometrics: data, models, and metrics, 1st edn. IGI Global
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
Traoré, I. (2021). Continuous Authentication. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1503-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1503-1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering