دورية أكاديمية

A survey of continuous and transparent multibiometric authentication systems

التفاصيل البيبلوغرافية
العنوان: A survey of continuous and transparent multibiometric authentication systems
المؤلفون: Al Abdulwahid, A., Clarke, Nathan, Stengel, I., Furnell, Steven
المصدر: Research outputs 2014 to 2021
بيانات النشر: Edith Cowan University, Research Online, Perth, Western Australia
سنة النشر: 2015
مصطلحات موضوعية: Authentication, Biometrics, Continuous authentication, Tas, Transparent authentication, Computer crime, Digital devices, Interoperability, Surveys, Authentication methods, Authentication systems, Continuous authentications, Critical analysis, Multi-biometrics, User authentication, Information Security, droit, info
الوصف: he advancement of technologies and the increasing number of users utilising them has given rise to a significant concern over protecting them from misuse. The integral aim of any IT system is to safeguard resources against any illegitimate access and authentication is the cornerstone to enabling this. Arguably, existing user authentication approaches have not adequately advanced proportionally with the advancement of digital devices technologies. The majority of implementations also operate merely at point-of-entry, providing little consideration to on-going identity confidence, leaving the system susceptible to misuse. Research has proposed continuous authentication as an alternative that can provide additional security, albeit introducing an additional burden upon the user if not implemented considerately. A range of studies have been proposed to overcome these downsides without compromising the user convenience by continuously and transparently authenticating the user throughout. This paper performs a survey and critical analysis of the domain, in particular focussing upon the role that multibiometrics has and its viability in practice. Studies have found that a variety of biometrics techniques have been investigated including physiological only, behavioural only and both, with the addition of soft biometrics or even passwords, rendering them not to be completely transparent thereby suffering from intrusive authentication drawbacks. The operational context also varies, including PC, mobile, wearable, various devices, and the Internet/cloud. Therefore, it is evident that there is a lack of anempirical solution that can be accomplished seamlessly in a location, technology and service independent fashion. With respect to performance, many studies never undertook an evaluation; others declared heterogeneous metrics, making a comparison implausible. Despite the fact that most of the studies deployed an identity confidence/trust adaptation, a small proportion of them associated it to the differing risk level of a ...
نوع الوثيقة: text
اللغة: unknown
العلاقة: https://ro.ecu.edu.au/ecuworkspost2013/1170Test
الإتاحة: https://ro.ecu.edu.au/ecuworkspost2013/1170Test
حقوق: undefined
رقم الانضمام: edsbas.FF5E9558
قاعدة البيانات: BASE