Next Article in Journal
Brazing Coupling Performance of Piezoelectric Waveguide Transducers for the Monitoring of High Temperature Components
Next Article in Special Issue
WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks
Previous Article in Journal
Timely Reliability Analysis of Virtual Machines Considering Migration and Recovery in an Edge Server
Previous Article in Special Issue
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review

by
Luis Hernández-Álvarez
1,*,
José María de Fuentes
2,
Lorena González-Manzano
2 and
Luis Hernández Encinas
1
1
Institute of Physical and Information Technologies (ITEFI), Spanish National Research Council (CSIC), C/Serrano 144, 28006 Madrid, Spain
2
Computer Security Lab (COSEC), Universidad Carlos III de Madrid, 28911 Madrid, Spain
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 92; https://doi.org/10.3390/s21010092
Submission received: 18 November 2020 / Revised: 18 December 2020 / Accepted: 22 December 2020 / Published: 25 December 2020
(This article belongs to the Special Issue Cryptography and Information Security in Wireless Sensor Networks)

Abstract

:
Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection and, typically, are implemented only when accessing the device. Nevertheless, in many occasions it is necessary to carry out user authentication in a continuous manner to guarantee an allowed use of the device while protecting authentication data. In this work, we first review the state of the art of Continuous Authentication (CA), User Profiling (UP), and related biometric databases. Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization. The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric features with privacy-preserving approaches.

1. Introduction

Nowadays, smartphones, tablets, and some resource-constrained devices are commonly being used to store private information such as financial data, personal, or professional documents and social communications. With the advent of wearable or implantable medical devices, even medical signals from a heart rate or one’s blood sugar level can be recorded.
This method of storing information is effective and comfortable, but it also makes data potentially vulnerable to cyberattacks. They may occur because of software infection (e.g., Android malware [1]) or lack of user diligence. Therefore, it is essential to implement a minimal access policy. One of the mechanisms for this policy is authentication, ensuring that the porting user is the legitimate one. Traditionally, it has been achieved by means of passwords, PINs, or patterns that must be typed in by the user. However, these techniques face two main issues. On the one hand, complex passwords are rare to find as they are difficult to remember, thus leading to guessable authentication codes [2]. On the other hand, they provide permanent access to the device, so all data would become compromised if the device is stolen at any time after authentication.
To address this issue, Continuous Authentication (CA) approaches have been proposed [2]. Thanks to CA, the identity of the porting user is periodically verified, typically by relying on sensor-based data or biometric features (e.g., accelerometer, gyroscope, electrocardiogram) and artificial intelligence tools. An alternative option is User Profiling (UP) or, in other words, a prediction of one or several traits of the personality of a user based on his biometric information. This does not allow to specifically authenticate a user, but to allocate them to a specific group which can thus be considered a first-level CA. The study of this approach is important not only for offering assistance to CA with initial classification, but also for its application to other fields such as marketing or population statistics.
However, the security of the information used to conduct CA or UP is threatened, particularly in cases in which the authentication is carried out by an external server. The leakage of this information could lead to user identity theft (or a trait of their identity) by the attacker. This has been the goal of Advanced Persistent Threats in the past, such as the case of Operation Aurora, which compromised RSA’s SecureID information [3]. As a consequence, the importance of privacy-preserving techniques that ensure both the security of the user’s biometric information and its utility in authentication applications, has increased considerably. Some approaches have already been proposed considering two biometric traces (such as iris and touch dynamics), but more investigations regarding this topic are needed.
In the last few years, user authentication mechanisms (CA and UP) have attracted attention from the research community. In particular, more than 3800 results can be found through Google Scholar (https://scholar.google.com/scholar?as_ylo=2016&q=%22continuous+authentication%22&hl=es&as_sdt=0,5) for papers related to this term since 2016 to date. Given the relevance of this area, several surveys have already provided a comprehensive overview of these efforts [4,5,6,7]. Nevertheless, this study differs due to the inclusion of research related to CA or UP based on sensorial data, and on the analysis of CA schemes that contains privacy-preserving techniques to protect sensorial data. It is important to clarify that in our exhaustive research, no investigations focused on UP and privacy-preserving based on the use of sensors have been found.
With this work we aim to provide an overview of the current research status of user authentication techniques, reviewing several of the most recent publications focused on CA and UP, and highlighting the usefulness of sensors to acquire the biometric information. Moreover, a summary with the most important databases for user authentication that are publicly available is facilitated. We also include a description of privacy-preserving techniques commonly used in authentication procedures and their application in CA schemes, as well as a review of the most important cryptographic techniques, whose utility may be beneficial in developing new methods to guarantee information security. Therefore, in contrast to the previously named articles, this work only includes investigations based on sensorial data, and what is considered to be a sensor instrument includes an electrical device whose actions goes beyond wireless communications.
The organization of the rest of this work is as follows: In Section 2 the concepts of CA and UP are defined and differentiated, and the methodology followed is described in Section 3. The state of the art of CA and UP are presented in Section 4 and Section 5, respectively, and descriptions of the biometric databases and their main properties are included in Section 6. Then, Section 7 contains the explanation of current privacy-preserving techniques and their application in CA. Finally, the conclusions and some future lines of research are in Section 8.

2. Background

Prior to the study of publications focused on the fields of interest, it is important to establish some specifications that allow us to differentiate between simple authentication, CA, and UP, and between data privacy and data security.
The idea of simple authentication refers to the verification of the identity of a device’s porting user only once, at the beginning of a session, while CA involves the recurrent identification of the user during an entire session. This last concept can be attained in two main ways [2]:
  • Active implementation: Achieves the verification of the user’s identity by asking them to introduce credentials regularly. Therefore, traditional authentication systems can be used for this implementation such as passwords, patterns, fingerprints, etc. However, the user might be annoyed by the continuous requests during each session, and they can be a source of attacks if an adversary has access to that information;
  • Passive/implicit implementation or soft biometrics: Performs user authentication by collecting data transparently, so that the user is not aware of this checking. In this manner, the user would not be disturbed each time the authentication is conducted, but its realization is more complicated. This information is based on non-invasive user biometric traces that can be obtained from device usage.
Regarding UP, it implies the prediction of a personality trait of one user by using biometric features extracted with the sensors of the device of interest. To perform authentication, this prediction is repeated recursively to verify that the same result is obtained. In this case, the same division (active/passive) as in CA can be made.
In this work, we are going to consider only articles oriented to the passive implementation of CA or UP, either by developing a transparent scheme or by designing a protocol that collects biometric features without interrupting the interaction of the user. Hence, studies that explicitly address CA or UP, but are limited to its active implementation and do not deal with the passive approach, have been dismissed. Some works have focused on preserving the privacy of the sensorial data used in both CA and UP. However, as commented before, the later is used on different applications as, for example, personalized advertisements or profile matching in social networks. The investigations that study the protection of the information in UP are specifically directed to these areas and not to user authentication or authentication schemes and, thus, we decided to not include them in this review.
For all cases, the biometric data used to conduct the authentication protocol can be divided in two groups, depending on its nature [2]:
  • Behavioral information: Data that describes the behavior of the owner, including features such as battery consumption, GPS location, or installed applications. This information is used to confirm the user’s identity by comparing its current values with regular user habits;
  • Biological information: Data collected from biological attributes, inherent to the owner, that cannot be obtained from any other person. This group, in turn, can also be differentiated in physical aspects, as the color, shape, and size of the iris or face, and physiological and health-related signals, such as the photoplethysmogram (PPG), electroencephalogram (EEG), or electrocardiogram (ECG).
Moreover, in [8], it has been studied that some aspects related to the social behavioral features of people can be considered as biometric traits. In fact, a multi-modal system has been proposed joining social behavior with traditional biometrics as a system to recognize users. The results point out that a user’s identity can be tracked considering their interactions through social media even without any other identification characteristic or demographic information. Some of these social behavioral features are related to the interaction with tweets (hashtags, retweets, replies), blogs, conversations, etc. However, these social attributes will not be considered in this work, as they are not sensor-based features.
In Figure 1, the division and subdivisions of the features utilized for user authentication are shown, as well as some examples for each class.
With respect to data protection, the difference between data security and data privacy should be clarified. Data security is the process by which information is protected against unauthorized access and data corruption, and its main properties are confidentiality, integrity, and availability as well as, in the case of biometric templates, renewability and revocability. On the other hand, data privacy can be defined as the appropriate organization, storage, and transmission of data, which must always be done with the permission of the owner and is characterized by irreversibility, unlinkability, and confidentiality [9,10]. In this sense, privacy-preserving refers to security processes used to guarantee the privacy of data communicated between different parties.
The following sections introduce the principal approaches of CA and UP, divided by the sensor used to collect biometric features.

3. Methodology

The applied methodology is the one described in PRISMA (http://www.prisma-statement.org/):
  • Identification of records through database searching. The principal databases utilized were Google Scholar and IEEE Xplore, and the searching queries were “passive continuous authentication”, “implicit continuous authentication”, “privacy-preserving”, “user profiling”, and “user authentication”. These queries were introduced both individually and combined in order to find more concrete articles. Additionally, the bibliography of the articles collected through this methodology was examined to increase the potential bibliography and find references for the most used biometric databases. The total number of articles obtained was 171;
  • Exclusion of duplicated or non-related records after screening. The selection of this step reduced considerably the number of works, as those that mention passive CA but are focused on active CA were dismissed;
  • Exclusion of non-related records after its study. The number of researches discarded in this step was small and specially related to not using sensors in the authentication process;
  • Analysis of the remaining articles. The final number of studied papers is 62, and all of them are presented in Tables 1–3, depending on their specific content.

4. Continuous Authentication

This section contains information about all the analyzed and referenced studies, including employed features and techniques, used databases, and produced results, and it is summarized in Table 1. Note that this classification include raw sensors and features (e.g., touch dynamics) which can be achieved through the combination of multiple sensors.

4.1. Sensors for Device Interaction

The work presented in [11] studied the utility of information representing battery consumption, transmitted data, and background noise and light (and combinations of them) for CA. The information, collected from the SherLock database, permits the device to work autonomously on the CA process, as it is non-assisted sensorial data. The classification was performed using Naive Bayes (NB), K-Nearest Neighbor (KNN), and Hoeffding Adaptive Trees (HAT), and showed that the combination of battery consumption and ambient noise and light produces accurate outcomes in a rapid manner.

4.2. Sensors for Motion

In [12], a method that recognizes the physical patterns of a user carrying out different physical activities is proposed. Data included information from the accelerometer, gyroscope, or magnetometer sensors and was acquired from the MobiAct, HAR, and PAMAP2 datasets. A Support Vector Machine (SVM), Decision Tree (DT), and Random Forest (RF) were used as classifiers. The results indicate that information produced by dynamic activities (walking, jumping, running) form distinguishing features for user identification, while static activities, despite also presenting good accuracy values, are not as determinant. Similar results have been shown in [13].
Sensors that acquire motion features, such as accelerometers, are combined with sensors that collects information regarding screen touch in [14]. The authors use Long Short-Term Memory (LSTM) neural networks to process and model the user’s behavior in real-time and with high frequency, obtaining good results in terms of FAR, FRR, and EER. To carry out this study, the sensorial data of 84 subjects was utilized.
Likewise, in [15,16,17,18,19] sensorial data from the accelerometer, gyroscope, magnetometers, and other sensors of a smartphone, is obtained to verify the identity of a user depending on their walking patterns or pace.

4.3. Sensors for Touch Dynamics

Touch dynamics or touchscreen behavioral biometrics is based on the collection of data that describes the interaction of the user with the screen of their smartphone, including, among others: Position, distance, time, area, pressure, and speed. One of the first papers that worked on this is [20], where the authors showed that the identity of the user can be confirmed by measuring the time lapse between the pressing of two keys, the amount of time that a key is pressed, and the pressure exerted on a key. In [21], several machine learning (ML) models were analyzed to identify the best option for touchscreen behavioral biometric authentication, yielding good results in all the algorithms explored.
The work performed in [22] proved that touchscreen behavior can be successfully used as a protocol for passive CA. In this case, 30 different biometric behavioral touch-related characteristics were collected and used to train KNN and SVM classifiers. The outcomes provided, in terms of Equal Error Rate (EER), were between 0% and 4%. A similar proposal is given in [23], achieving good accuracies also with a Gaussian Radial Basis Function (RBF) kernel-based SVM.
In [24], five machine learning algorithms are compared to assess touch-dynamics-based CA. The classifiers explored were DT, NB, Kstar, RBF Network, and Back Propagation Neural Network (BPNN). They were trained with 21 features based on touchscreen interaction and the best result was achieved with a RBF Network ( 7.71 % EER). To improve this approach, the authors combined the RBF Network classifier with Particle Swarm Optimization, which helped the model to compensate the behavioral variations of the user. With this hybrid model, the EER was reduced to 2.92 %.

4.4. Voice Sensors

A CA protocol on wearable glasses based on touch dynamics and voice commands is proposed in [25]. In this case, the authors used seven different SVM classifiers for the different features recorded from the touch and voice behavior of the user, showing that the usage of voice commands can improve the results obtained with touch dynamics data.
Another procedure, called VAuth, for CA in voice assistant systems is proposed in [26]. This technique is based on the incorporation of an accelerometer into devices, such as earbuds or eyeglasses, to measure the body-surface vibrations of the user and compare them with the commands received by the voice assistant. The VAuth procedure was assessed over 18 individuals and 30 voice commands, producing important results (97% in accuracy) and showing that the information (body vibrations) captured with an accelerometer is sufficient for voice-based CA.

4.5. Sensors for Facial Recognition

Face recognition is one of the most used biological features for user authentication. Generally, face recognition authentication is conducted by taking an image with the smartphone camera and extracting its local features, which are then utilized as inputs of a classifier [53].
An evaluation of face recognition techniques for CA in smartphones is presented in [27]. For this task, the authors examined 750 videos from 50 individuals executing different activities in varying ambient conditions, and adding other distortions such as occlusions, blur, or pose changes. The results produced indicate that current face recognition algorithms need to be improved in order to use them for CA in real scenarios, as alterations in illumination or user appearance (hair style, hair dye, shaving, etc.) still suppose a big limitation. As a result, other works have published an enhanced face recognition method for conducting CA, including [28,29], which, respectively, show the utility of SVM models and deep Convolutional Neural Networks (CNN) for this task. Additionally, in [30] a procedure for the specific recognition of partially covered or occluded faces for CA is proposed. This method is based on identifying facial segments by using 14 feature detectors and a SVM classifier which showed to be efficient in accuracy and time.
The work presented in [31] focused on a face recognition algorithm for multiple users. This is a complex task, given that the accuracy behaves inversely to the number of individuals registered. The proposed method consists of two parts, estimating first the user whose identity must be approved and, after, confirming it. The results showed good accuracy scores that were not unduly influenced by the inclusion of a new user.
In [32], the pre-trained CNN ResNet was used for face-recognition-based CA. The outcomes produced in this work reveal the methodology’s good performance (EER of 0.86 %), even distinguishing between the real face and a picture of the user (best EER of 1.4 %).
Other, more concrete features present in the face have also been studied to carry out authentication. Among them, the most important are characteristics from the nose [33,34], teeth [35], and lip motion [36,37]. However, these features have usually been used as complementary information in multi-biometric authentication, and not for CA by themselves, but are acquired without interrupting the activities of the user.

4.6. Sensors for Ocular Recognition

Ocular features refer to information related to the periocular region, iris, or eyebrows, among others.
The characteristics of the periocular regions of several individuals are studied in [39] using a Gaussian Mixture Model (GMM). The images were obtained form the MOBIO and CPqD databases and the outcomes indicate that periocular information may be good as complementary data, but it does not perform better than face-based authentication.
In [38], a real-time iris recognition mechanism is suggested to conduct CA using an eye tracker and a KNN algorithm, obtaining accuracies around 90%.
An eyebrows-based authentication procedure is presented in [41], combining computer vision (CV) and machine learning tools. The best result produced was 1.08 % EER using images of both the user’s eyebrows, a GIST descriptor, and a SVM classifier.

4.7. Sensors for Other Bodyparts Recognition

Prints extracted from several parts of the body and that are representative of each individual have also been proposed as features for CA. The most widely-known case is fingerprints, as they are commonly used to unlock smartphones. However, among these characteristics, the hand, ear, and vein are also included.
For fingerprint-based authentication, several methods have been proposed. One example is presented in [45], where the authors use computer vision tools, as SIFT (Scale-Invariant Feature Transform) or DoG (Difference-of-Gaussians) descriptors, to match the geometric features of finger images. The hand geometry data is combined with touch dynamics information in [46], obtaining good EER results by means of a KNN and a SVM classifier. Alternatively, in [44], the infrared images of hands are used to extract hand geometry and vein pattern in order to perform authentication. However, these methodologies are active CA, requiring the user’s attention to be performed.
A system that uses several bodyprints to perform CA is proposed in [43]. In this case, the prints of the ear, fist, phalanges, hand palm, and fingers are analyzed, depending on how the user is using or holding the device. By using a threefold procedure, the accuracy is never lower than 95%, obtaining the best authentication score with the ear prints ( 99.8 % of accuracy and 7.8 % FRR).
Additionally, studies have been conducted around whether a person can be identified by their odor. Despite the lack of intensive studies on this topic, it has been shown to be feasible [42].

4.8. Sensors for Physiological Features

The previously described attributes are included in the physical subdivision of biological features. In contrast, physiological features represent the health properties of a user. Such kinds of characteristics have gained importance during recent past years due to its potential in CA applications by means of wearable devices or implantable medical devices.
One of the most important examples is the use of ECG information in real time. The studies shown in [50,51] demonstrate the feasibility of non-contact ECG measurements for CA purposes using different classifiers (SVM, KNN, etc.) and information (statistical, morphological, or wavelet properties). In [52], a simpler feature extraction mechanism is proposed, avoiding complex and expensive computations. Several artificial intelligence approaches were investigated and the results suggest that a RF classifier is the most appropriated tool in this context.
Data obtained from EEG or PPG signals can also be used with this purpose. For example, in [49] the reactions of a user to their own photos or to external photos are analyzed with EEG signals to, later, perform CA by auto-regression coefficients methods. PPG-based CA have also been explored [47,48].

5. User Profiling

Alternatively to CA, UP distinguish users by allocating them in different groups, depending on the specific sensor-based data collected of each user. In the following subsections, proposals of this way of user authentication are introduced, organized by the feature utilized, and are summarized in Table 2.

5.1. GPS

The work in [59] uses the deep learning technique Word2Vec to extract patterns from a user’s GPS coordinates and predict their gender, age distribution, marital status, if they have children and, in case it is a student, their academic faculty. The approach consisted on treating each location point as a word, so that each embedded vector (sentence) represents a trajectory of a user. The data was acquired from the SherLock and CARS datasets, and the authors showed, in terms of accuracy, that complete trajectories (based on all the data) are better (around 83% in SherLock and 76% in CARS) than daily trajectories (70% in SherLock and 63% in CARS) for this type of prediction.
In [57], the location from where a user connects to a social network is used to predict some of its demographic attributes: Gender, age, education background, sexual orientation, marital status, blood type, and zodiac sign. In this study, the location was defined by three features, temporality, spatiality, and location, which were correlated with the attributes of the subject using a framework named location to profile. Although the model did not show high efficiency in predicting sexual orientation, marital status, blood type, and zodiac sign, it has a good performance in gender, age, and education background.
Other works, such as [55,58] focus on relating the demographic features of people with visiting patterns, spatial trajectories, and the difference between time spent at home and outside. Interestingly enough, Markov models were used in [56] to predict the next location of a user based on trajectory patterns tracked by the GPS information of its smartphone.
In [54], the movement, phone usage, and communication behavior of a user is studied to estimate several demographic attributes.

5.2. Ocular

Some ocular attributes, such as pupil position and radius, have also been used for user profiling in [62,63]. In these cases, CNN were utilized to predict the age and gender of different users. Likewise, in [61], the same objective is achieved using SVM models and Multi-Layer Perceptrons (MLP). It has also been explored to predict the age group of an individual from the information of their iris and pupil thickness [60].
The solutions described in the sections above (CA and UP) aim to facilitate the usability of CA schemes and, therefore, are based on techniques transparent to the user (passive CA). Thus, from the user perspective, all methods are similar in terms of usability. However, we believe that SVM and DT models are the most prone approaches to be enhanced and utilized in these applications for two reasons:
  • These are two of the main principal machine-learning algorithms and, hence, they are well studied, and provide several implementation options and different possibilities when defining the learning process;
  • Furthermore, they have been widely used in the studied papers and both algorithms provide the best results. Therefore, their usefulness in biometric CA is already demonstrated, particularly with motion, touch dynamics, and voice features.
Although these artificial intelligence techniques do not imply privacy or security issues, their use commonly involve the sharing of data with external servers (see Section 7), which results in security and privacy concerns, as the theft of this information could lead to identity fraud. None of the articles already described take into consideration these concerns when designing their methodologies, in contrast to those included in Section 7.3.

6. Datasets

In this section, we include an overview of several databases that have been published in recent years. All of them are publicly available. Attending to the type of data proportionate to these databases, we divided them in two groups: Behavioral databases, which are based on data for behavioral authentication and biological databases which are data for biological authentication. Additionally, a more extended description of SherLock [1] and SWAN [64] databases are presented as we consider them the most complete and relevant databases of the sensorial and biometric groups, respectively. It should be noticed that, independently of the data type, most collected data are private. Thus, the collection process and its public disclosure should be performed considering regulations such as General Data Protection Regulation (GDPR) [65] and the ePrivacy Regulation (ePR) [66]. For instance, some anonymization techniques can be applied. However, most works do not provide information in this regard and just the dataset descriptions are provided.

6.1. Behavioral Datasets

  • The Device Analyzer dataset [67] was published in 2011 and presented a fault tolerant system architecture for collecting general mobile sensorial data in Android-based devices at a sampling rate of 5 min. The study capture behavioral features like call logs, SMS history, and the location, power, and settings of the device, and was performed with more than 30,000 users;
  • The database LiveLab Project [68] collects measurements of wireless networks and behavioral characteristics obtained during the year 2010 from 34 iPhone 3GS at a sampling rate of 15 min;
  • The LDCC dataset [69] is formed by 170 users from which, over 2 years, behavioral attributes that reflect user social interaction were collected: Social interaction data (call and SMS logs, and Bluetooth usage), location data, media creation, and usage data (location where images or video was captured or music played), and applications usage. The participants used the Nokia N95 and information was collected at a variable rate between 30 and 600 s;
  • Originally, the dataset Social Evolution [70] was created to analyze the measured sensorial data to sense the health status of a community. It is based on the collection of mobile behavioral characteristics, such as call and SMS logs or WiFi strength, of 80 students during an academic year at a sampling rate of 6 min;
  • The Reality Mining database [71] consists of behavioral data collected from 100 Nokia 6600 smart phones at a rate of 6 min. This information includes call logs, Bluetooth devices in proximity, application usage, and phone status, and was acquired in a period of 9 months;
  • The collection of data available in the SherLock dataset [1] was performed between 2015 and 2018 in Samsung Galaxy S5 smartphones of 50 different users. In this work two agents were developed; a data compilation agent named Sherlock and a malicious agent called Moriarty. The objective of Sherlock is to obtain a high amount of monitorable features at a high sampling rate, while Moriarty, designed as a normal application (game, sports, or music app, for example) might be executing its malicious activity. Depending on the version of Moriarty, this activity may include the unauthorized transmission of the contacts of images stored in the device, location, audio, notifications of other applications (Facebook, Gmail, or Skype), or web history. However, Moriarty also creates a label when it realizes its operation to let Sherlock know when the malicious activity was performed. In this way, aside from creating this dataset, the authors also demonstrated its utility in the cybersecurity field by performing a malware analysis and evaluating different CA algorithms. The obtention of different monitorable features (called sensors) was performed by groups (called probes). Therefore, each probe collected by SherLock contained the measurements of a certain number of features. Additionally, these probes where defined as push probes if the collection was activated by a specific event (such as receiving a notification) or as pull probes if it was conducted recurrently. As a result, the SherLock dataset is organized into tables that contain the different probes. A complete description of these tables can be seen in Tables 8 and 9 of [1].
    Apart from the explicit labels of the malicious activities left by Moriarty, the SherLock dataset presents other advantage when compared to the previously mentioned datasets. The first one is its temporal resolution, improved by reducing the sampling rate up to 5 s in some of the probes. The minimal sampling rate among the other datasets is 60 s (LDCC [69]), whereas SherLock collects probes at 5, 10, and 15 s. Additionally, SherLock presents the widest variety of data.

6.2. Biological Datasets

  • The MOBIO database [72] was published in 2012 and is formed by the face and voice of 150 English-speaking subjects. This information was obtained with a Nokia N93i mobile phone in 12 sessions separated by several weeks. The voice recordings were sampled with pre-defined and free text uttered by the participants;
  • In 2014, the CSIP dataset [73] was published. This database consists of the iris and periocular information of 50 individuals, collected using alternative settings of four different devices (Sony Ericsson Xperia Arc S, iPhone 4, ThL W200, and Huawei U8510), defining a total of 10 setups. In addition, the data was compiled in different locations, changing the illumination conditions;
  • The face, teeth, and voice of 50 people is presented in the FTV dataset [74]. The camera and microphone of the HP iPAQ rw6100 smartphone were used under different illumination and noise constraints;
  • The MobBIO database [75] presents the face, iris, and voice biological features of 105 volunteers from Portugal, the U.K., Romania, and Iran. An Asus Transformer Pad TF 300T was used to collect the data. The face and iris images were taken using the back camera of a device with two different lighting conditions, while the participants read 16 sentences in Portuguese to record the voice samples;
  • The database UMDAA [76] includes the face, as well as multiple data that represents behavioral characteristics, including touchscreen, gyroscope, magnetometer, light sensor, GPS, Bluetooth, accelerometer, WiFi, proximity sensor, temperature sensor, and pressure sensor. The study was performed with 48 volunteers, using Nexus 5 phones in a time frame of 2 months;
  • The MobiBits database [77] is based on five biometric features: The voice, face, iris, hand image, and handwritten signature over the screen of 55 subjects. The devices used were Huawei Mate S, for handwritten signatures and iris and periocular data collection, Huawei P9 Lite, for voice recordings, and CAT s60, for face and hand images acquisition. The data collection was divided in 3 sessions at typical office conditions;
  • The SWAN Multimodal Biometric Dataset [64] presents a collection of biological data obtained between 2016 and 2017 using an iPhone 6. The information compiled include three physical characteristics of 150 subjects, which are: Face, periocular, and voice. These characteristics were collected in different sessions, separated by a time gap between 1 and 3 weeks, in supervised and unsupervised scenarios. Additionally, the environment was changed during the data acquisition of each session (indoor and outdoor acquisition) thus, modifying the illumination and noise conditions, simulating real-life situations. The 150 participants were from four different countries (India, Norway, France, and Switzerland), providing multilingual voice and multiple ethnicity representation to the dataset. The voice recordings were obtained based on four predefined sentences with variable parts that were spoken in English and the national language of each participant. In one of the sessions, the data of the three biometric features were obtained using an iPad Pro and modified, generating artifacts, in order to use it to generate a presentation attack dataset.

7. Privacy-Preserving Approaches

This section introduces different privacy-preserving techniques already utilized in authentication mechanisms and some examples of their combination with CA. It should be recalled that no investigations related to UP and privacy-preserving using sensorial data was found.
As we have mentioned above, authentication protocols are used to allow or deny access to a specific device depending on the information produced by the user aiming to use the device. This information can be collected from a wide range of sensors, as described in Section 4. Consequently, these systems are commonly composed by two phases [78]:
  • Enrollment Phase: In which a template of the owner’s features is produced and stored in the authentication server, which can be the same device (on-device), or a third party (off-device, or outsourcing);
  • Verification Phase: Where the information of the user is introduced as input to an authentication algorithm and compared to the template in order to obtain a positive or negative output.
Although these protocols and, especially in CA, might improve access security and user interaction simultaneously, it also raises privacy concerns. The reason is that descriptive information about the owner (e.g., templates) is being used and, in some cases, shared with other authentication servers. This data can be used in an unauthorized manner to thieve the identity of the owner. For example, characteristic cardiac pace or body prints can be extracted if biological information is utilized, while touch dynamic information could be used to predict the keys of the virtual keyboard that have been pressed and, consequently, the applications that the owner uses.
Therefore, in the context of authentication, it is necessary to protect the user’s data [79]. Privacy-preserving approaches are in charge of this task, executing cryptographic algorithms that encrypt both the owner’s template and the user’s input. These approaches are focused on the specific weaknesses of each authentication protocol design. The most important types of attacks that affect biometric information are [80,81,82]:
  • Biometric overtness: The intruder attacks the device to steal the template or modify it by distorting its content;
  • Non-secure infrastructure: In case a third party is included as an authentication server, the attacker can gain access to the template by intercepting the communication channel between the device and the authentication server. Similarly, a non-trusted authentication server could use the template’s information to analyze the profile of a legitimate user and use it with malicious purpose;
  • Administration attack: The attacker alters the database where the templates are stored. This includes the addition, modification, and deletion of templates.
Based on current authentication protocols, explained attacks, and existing articles focused on privacy preservation, privacy-preserving approaches can be divided into two categories: Template protection and data outsourcing [83].

7.1. Template Protection

The owner’s data template generated during the enrollment phase is stored in a template database by the authentication server. To avoid the attacks previously described, this template should be protected in order to make the information inaccessible to unauthorized users. Additionally, it should be possible to cancel or update the template in case it is altered by an attacker. Thus, a biometric template protection procedure must fulfill the following requirements [82,84]:
  • Diversity: The template should ensure the owner’s privacy by not allowing cross-matching across databases;
  • Revocability: It should be possible to revoke and/or renew a compromised template;
  • Irreversibility: The problem of obtaining the original biometric template from the protected one should be computationally difficult to solve;
  • Performance: The protection technique should not degrade the performance of the authentication protocol.
A template protection technique that meets these specifications is essential in privacy-preserving approaches. Several classifications exist for template protection schemes [85,86]. For the sake of simplicity, the one proposed in [84] is considered:
  • Cancelable Biometrics/Feature Transformation: This concept refers to the use of deliberately distorted biometric features to generate disrupted versions of the template. In this way, the distortion parameters can be modified if a cancelable feature is compromised, producing a new template. This improves the security level by enabling the use of several disrupted templates, all of them associated with the same biometric information, but may reduce the performance of the authentication system [87]. Cancelable biometrics are usually divided into two categories [84,88]:
    -
    Salting: An invertible transformation is used to alter the features, hence being possible to recuperate the original information;
    -
    Non-invertible: The distortions are produced with an irreversible function, which imply better diversity and revocability than salting methods.
  • Biometric Cryptosystems: In these systems, the biometric information is encrypted or a cryptographic key is associated or directly generated from biometric features [84,89,90]:
    -
    Key binding: The biometric features and an owner-chosen key are combined in the enrollment phase to generate a secure template or helper data via a trusted bit-replacement algorithm. In an appropriate decoding trial, this algorithm would extract the key with the helper data, providing access to the user. The most important schemes of key binding biometric cryptosystems are Fuzzy Commitment [91] and Fuzzy Vault [92];
    -
    Key generation: In this case, the biometric key is generated from the helper data (obtained from the owner’s template) and the user input features. The main problem with this scheme is that, normally, biometric templates are not consistent enough to be used a key generators. An example is the Secure sketch-Fuzzy extractor [93].

7.2. Data Outsourcing

A mode of data management is data outsourcing, in which the owner’s information is shared with an external authentication server. This server is in charge of keeping the authentication software, infrastructure, and templates updated, thus facilitating the process [78]. Nevertheless, this also implies an increase on the risks of this information being attacked or stolen.
Some protocols and tools that have been useful to design privacy-preserving CA schemes [94,95], as they minimize these risks, are:
  • A Hash Function is an easy-to-compute function, which is applied to a given message or information m, with variable size, and produces a message digest of fixed size. The message digest, h ( m ) = m ˜ , is a complex function depending on all bits of the original message, m. In fact, if a unique bit of the message is changed, its digest will change, approximately, in half of its bits. The standard hash functions are denoted by SHA-2 and SHA-3 [96,97]. Hash functions have been used in active CA to compare the password introduced by the user and the stated password, but their application with biometrics is more limited as it is difficult to generate the same hash from biometric data [9]. However, they are useful for instance, in creating pseudo-anonymous user identifiers;
  • A Symmetric (or secret-key) Cryptosystem is an algorithm characterized by using a unique key that is only known in advance by the two parties that encrypt/decrypt messages. The encryption and decryption functions must be “easy” to compute for users of the cryptosystem and “difficult” to compute for an adversary, so even if the cryptogram is intercepted, it would be impossible to retrieve both the message and key. The most used symmetric encryption is Advanced Encryption Standard (AES) [98] which uses keys of 128, 192, and 256 bits. Format-Preserving Encryption (FPE) is a concrete type of symmetric cryptosystem, whose output (ciphertext) and input (plaintext) are in the same format. This can also be understood as a cryptosystem whose domain and range coincide [99,100,101]. A recent study in which this tool is explored for CA applications using smartphone sensors is presented in [102];
  • An Asymmetric (or public-key) Cryptosystem is an algorithm characterized by using two different keys. One of them, the public key, is publicly known, so anyone can use it for encrypting a message intended for the owner of the key. The second key, the private key, is kept in secret by the receiver and is the one that allows one to decrypt the messages received. The public and private keys are related to each other, but in such a way that obtaining the private key from the public key supposes solving a computationally difficult mathematical problem [94]. The most used asymmetric encryption is known as RSA [103] and, to obtain a medium-term (2–3 years) security, the recommended length of its keys is of 2048 bits. Homomorphic Encryption is a form of asymmetric encryption that enables the computation on encrypted data without accessing to the secret/private key. Thus, it allows the owner’s encrypted information to be outsourced without explicitly sharing it [104,105,106]. Some examples of works exploring this method are [78,107,108,109].
Nevertheless, symmetric and asymmetric cryptosystems also present some drawbacks. Apart from the specific attacks on each cryptosystem (software and hardware), the encryption will be secure while the attacker does not know the decryption key, which is needed to obtain the original data and perform authentication [110]. To solve this, authentication could be carried out directly with the encrypted data, as studied in [102], or to keep the encrypted information and decryption key in a secure environment [110]. This secure environment could be a Trusted Execution Environment (TEE), a secure area of an infrastructure that guarantees the confidentiality and integrity of data and processes carried out in it. In the case of data outsourcing, the infrastructure is shared and solutions like the one presented in [111] could be used as reference to build an end-to-end secure, event-driven CA framework.

7.3. Applications in CA

The preservation of privacy of biometric information in CA systems has not received as much attention as in passive authentication methods or as in authentication protocols themselves. However, as demonstrated in (Chapter 3, [107]), “even when the adversary had no access to the users samples, reconstruction attacks were still feasible against most systems” and, therefore, the application of privacy-preserving protocols in CA systems is necessary. In this section, the most important examples of privacy-preserving techniques employed in CA systems are analyzed. Based on the biometric features whose security is studied, these articles can be divided into three groups (see Table 3): Touch dynamics traits, device interaction data, and unspecified.
The work presented in [78] developed two similar client-server interactive protocols based on scaled Manhattan and scaled Euclidean distances for securely and privately outsourcing touch dynamics data for CA. These methodologies consisted of using homomorphic encryption, symmetric encryption, and, for the scaled Manhattan distance protocol, an additional step with homomorphic comparison. The design ensures security against curious servers and clients, and was shown to be eligible for smartphones.
In [112], the authors propose a novel sanitization scheme to avoid the leak of identifiable information from keystroke data, such as passwords or e-mails. This scheme can be applied at the client and server sides and is based on removing sensitive information. However, it must be noticed that conducting the scheme on the client’s side supposes extra workload for the user, while executing it on the server may lead to transmission troubles. To solve this drawback, the authors propose data encryption and the use of the Extensible Messaging and Presence Protocol.
A different approach with the same objective is studied in [113]. In this case, the protection of touch dynamics data is conducted in three ways: Permutation, substitution, and suppression. The authentication protocol is based on the fulfillment of some rules by the mean distance between the reference information and input data. Even though these methodologies preserve the privacy of sensible data, the permutation approach is the only one that does not deteriorate the authentication accuracy.
In (Chapter 4, [107]) the use of Discriminant Component Analysis (DCA) and Multiclass Discriminant Ration (MDR) (supervised dimensionality reduction techniques) is proposed, in substitution of Random Projection (RP) or Principal Component Analysis (PCA), to enhance the protection of biometric templates via cancelable biometrics. The authors argue that the utility labels of the data should be predicted, while privacy-sensitive labels must be kept unseen, hence being RP and PCA less powerful for these tasks, as they do not utilize data labels.
In [80], the use of a credential called BioCapsule (BC) instead of the classic biometric template is suggested. A BC is obtained by fusing the user and owner biometric features and, in the authentication procedure, comparing this fusion with the reference BC. In this way, neither the owner’s template nor user information are used in its original version. To develop this methodology, the authors paid special attention to the potential attacks and, therefore, its advantage is its resistance against them. However, low quality data might be collected, challenging the performance.
The use of garbled circuits is proposed in [83] with the aim of reducing the energy and time consumption of outsourced privacy-preserving CA protocols. The utilized protocol is based on calculating the scaled Manhattan distance and Hamming distance over general biometric features and considering malicious adversaries. In comparison with other privacy-preserving approaches, this work shows clear improvements in terms of resources consumption.
A particular example of cancelable biometrics, biohashing, is investigated in [114] to protect the call information of 100 subjects. In this study, two models, KNN and SVM, are studied to conduct the authentication process. The results showed that, comparing the non-protected and protected data cases, a lower EER was obtained with a KNN for the second case. For the SVM, the FAR was also decreased, although the FRR was augmented.
In [102], a particular implementation of Format-Preserving Encryption is combined with sensorial data collected from smartphone accelerometers and gyroscopes (from the SherLock Database). SVMs, RFs, and LR were explored to carry out the authentication, while the protection protocol is based on a double encryption procedure, using FPE to encrypt the original information, and a asymmetric cryptosystem to prevent the theft of the information during its transmission to the server. The authentication is conducted with the data encrypted with the FPE, and the results show that the accuracy is reduced to only 5.18 % compared to the original data, indicating the utility of this methodology.
Finally, in [109], the authors use several features related to the interaction of the users with their devices (e.g., GPS, time charging battery, WiFi sessions duration) to construct a CA scheme based on homomorphic operations. The analysis performed ensures the protection of the data, even when the device behaves maliciously by using homomorphic encryption and order preserving encryption.
In general terms, previous works on privacy preserving in CA have focused on invertible transformations and homomorphic encryption. Distances are commonly used as metrics to perform the authentication protocol and, in all cases, data is outsourced to a server. Lastly, it is worth mentioning that the authentication frequency is not detailed in the articles and only one of them analyzes the consumption of resources by the applied protocol.

8. Conclusions and Future Works

It is unquestionable that, in the information age in which we live, protecting our private data from potential attacks is very important. Consequently, the study of CA and UP methods, as well as privacy-preserving techniques has gained relevance. With this work we provide a review on the state of the art of CA and UP, which are user authentication methods based on biometric data acquired from sensors of smartphones.
Regarding the study of CA and UP schemes without preserving the privacy of the data, the importance of sensors is evident, as their use to collect biometric data is essential. Thus, their correct functioning and calibration is key when designing these mechanisms. For these application, a wide range of sensors have already been explored and, therefore, future works may explore the option of combining several biometric features, hence performing multi-modal user authentication. Moreover, despite physiological features not being used as other biometric features in CA schemes, there are a considerable number of protocols that extract these kind of features in a transparent manner, making them suitable for CA applications.
With respect to the authentication schemes focused on preserving the privacy of the users’ information, more investigations are needed. Most of the published works use simple authentication methods, based on distances, with [102,114] the only works in which artificial intelligence tools are explored. Due to the limitations of current smartphones, it is preferable to include in the CA scheme an external server capable of managing sensorial information and executing the desired authentication mechanism. This is confirmed by the publications presented in Section 7.3, as all of them conduct data outsourcing, but employ similar privacy-preserving techniques based on simple invertible transformations or homomorphic encryption. Therefore, the sensorial data is always (and will presumably be) outsourced to a third party. For this reason we strongly suggest the use of classical cryptographic protocols to ensure information security, with the objective of executing a secure CA scheme:
  • Shamir’s Secret Sharing (SSS): Is a protocol in which information is distributed among n parties, with the information of each party being useless on its own. Only when these parts are joined, the initial information can be obtained again. If only t < n parts of the secret are needed to reconstruct it, this method is named a ( t , n ) —threshold secret sharing [116,117,118]. In a CA scheme the key could be composed of shares corresponding to different biological or behavioral features, belonging to different parties who want to access a system simultaneously. Then, such key is used for authentication and data protection, though considering the need of repeating this process after a given period of time to get CA;
  • Secure Multi-party Computation: Consists of procedures in which computation is performed by using inputs from different parties, provided they are going to be kept private (each party only knows its input) [119,120]. Given the widespread use of Internet of Thing (IoT) technology, IoT devices could be used to collect biological or behavioral features and thus, being considered different parties. Then, if data from all these devices are put together, it could be applied for authentication and data protection. Note that this approach is quite general and should be detailed in each particular situation;
  • Zero-Knowledge Proof (ZKP): Is an approach in which a party (e.g., user) is able to demonstrate to another party (e.g., authentication server) that knows certain information without exposing it or any other data. This procedure requires an input in form of protocol from the server, which the user should execute to prove that they have the information [94,121,122]. As pointed out in this paper, biological or behavioral features can lead to privacy problems but using ZKP, such features could be used without being disclosed. Nonetheless, performance is a key issue to consider in CA because ZKP should be executed from time to time and a system’s performance cannot be highly impacted.
The utility of these protocols in the context of outsourced data protection has been demonstrated in works like [123], computing cryptographic keys using biometric data via SSS, and [124,125], making use of the ZKP protocol to prevent the vulnerability of the biometrics used in authentication protocols. Different proposals could be based on machine learning techniques combined with SSS, avoiding that only one party knows all the information, as an agreement between several third parties is necessary to access information.
Finally, we believe that it would be beneficial to explore the use of more sensors in privacy-preserving CA mechanisms. For example, the use of some biological features such as facial attributes or physiological signals remains unexplored in privacy-preserving CA. In this sense, we propose the use of wearables (e.g., smartwaches, smartbands) and implantable medical devices, due to their common use in the recent years and to the transparency and facility to extract biometric information from their sensors.

Author Contributions

Elaboration, validation, reviewing, edition, and resource allocation, L.H.-Á., J.M.d.F., L.G.-M., L.H.E. Funding acquisition, L.H.E. All authors have read and agreed on the published version of the manuscript.

Funding

L.H.-Á. and L.H.E. have been partially supported by Ministerio de Economía, Industria y Competitividad (MINECO), Agencia Estatal de Investigación (AEI) and European Regional Development Fund (ERDF), through Project COPCIS, grant No. TIN2017-84844-C2-1-R, J.M.d.F. and L.G.-M. by CAVTIONS-CM-UC3M funded by UC3M and the Government of Madrid (CAM), and by Ministry of Science and Innovation of Spain by grant PID2019-111429RB-C21, and all authors by Comunidad de Madrid (Spain) through Project CYNAMON, grant No. P2018/TCS-4566-CM, co-funded with ERDF.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Acknowledgments

The authors want to express their gratitude to the reviewers for their valuable comments, which have helped to improve this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AccAccuracy
AESAdvanced Encryption Standard
AUCArea Under the Curve
BCBioCapsule
BNBayesian Networks
BPNNBack Propagation Neural Network
CAContinuous Authentication
CNNConvolutional Neural Networks
CRRCorrect Recognition Rate
CVComputer Vision
DCADiscriminant Component Analysis
DTDecision Tree
DoGDifference-of-Gaussians
ECGElectrocardiogram
EEGElectroencephalogram
EEREqual Error Rate
EFEigenfaces
ERError Rate
FARFalse Acceptance Rate
FFFischerfaces
FPEFormat-Preseving Encryption
FRRFalse Rejection Rate
GMMGaussian Mixture Model
HATHoeffding Adaptive Trees
HOGHistogram of Oriented Gradients
HTERHalf Total Error Rates
HMMHidden Markov Model
KFAKernel-Fisher’s Analysis
KNNK-Nearest Neighbor
KRRKernel Ridge Regression
LDALinear Discriminant Analysis
LMNNLarge Margin Nearest Neighbor
LRLogistic Regression
LSTMLong Short-Term Memory
MDRMulticlass Discriminant Ration
MLMachine Learning
MLPMulti-Layer Perceptrons
MMMarkov Model
NBNaive Bayes
NNNeural Network
PCAPrincipal Component Analysis
PPGPhotoplethysmogram
RBFRadial Basis Function
RFRandom Forest
RPRandom Projection
SIFTScale-Invariant Feature Transform
SRCSparse Representation Classification
SVMSupport Vector Machine
TNRTrue Negative Rate
TPRTrue Positive Rate
UPUser Profiling

References

  1. Mirsky, Y.; Shabtai, A.; Rokach, L.; Shapira, B.; Elovici, Y. SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (AISec’16), Vienna, Austria, 24–28 October 2016; pp. 1–12. [Google Scholar] [CrossRef]
  2. Obaidat, M.; Traore, I.; Woungang, I. Biometric-Based Physical and Cybersecurity Systems; Springer: Cham, Switzerand, 2019. [Google Scholar] [CrossRef]
  3. Leyden, J. RSA Explains How Attackers Breached Its Systems. 2011. Available online: https://www.theregister.com/2011/04/04/rsa_hack_howdunnit/ (accessed on 22 December 2020).
  4. Connor, P.; Ross, A. Biometric Recognition By Gait: A Survey of Modalities and Features. Comput. Vis. Image Underst. 2018, 167, 1–27. [Google Scholar] [CrossRef]
  5. Al-Naji, F.; Zagrouba, R. A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 2020, 163, 109–133. [Google Scholar] [CrossRef]
  6. Abuhamad, M.; Abusnaina, A.; Nyang, D.; Mohaisen, D. Sensor-based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Survey. IEEE Internet Things 2021, 8, 65–84. [Google Scholar] [CrossRef]
  7. Gonzalez-Manzano, L.; Fuentes, J.M.D.; Ribagorda, A. Leveraging user-related internet of things for continuous authentication: A survey. ACM Comput. Surv. (CSUR) 2019, 52, 1–38. [Google Scholar] [CrossRef] [Green Version]
  8. Sultana, M. Multimodal Person Recognition Using Social Behavioral Biometric. Ph.D. Thesis, University of Calgary, Calgary, AB, Canada, 2018. [Google Scholar] [CrossRef]
  9. Rane, S. Standardization of Biometric Template Protection. IEEE Multimed. 2014, 21, 94–99. [Google Scholar] [CrossRef]
  10. Gomez-Barrero, M.; Galbally, J.; Rathgeb, C.; Busch, C. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. IEEE Trans. Inf. Forensics Secur. 2017, 13, 1406–1420. [Google Scholar] [CrossRef]
  11. de Fuentes, J.M.; González-Manzano, L.; Ribagorda, A. Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 2018, 18, 1219. [Google Scholar] [CrossRef] [Green Version]
  12. Malik, M.N.; Azam, M.A.; ul Haq, M.E.; Ejaz, W.; Khalid, A. ADLAuth: Passive Authentication Based on Activity of Daily Living Using Heterogeneous Sensing in Smart Cities. Sensors 2019, 19, 2466. [Google Scholar] [CrossRef] [Green Version]
  13. Ehatisham-ul Haq, M.; Azam, M.A.; Loo, J.; Shuang, K.; Islam, S.; Naeem, U.; Amin, Y. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors 2017, 17, 2043. [Google Scholar] [CrossRef] [Green Version]
  14. Abuhamad, M.; Abuhmed, T.; Mohaisen, D.; Nyang, D. AUTo Sen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors. IEEE Internet Things J. 2020, 7, 5008–5020. [Google Scholar] [CrossRef]
  15. Damasevicius, R.; Maskeliunas, R.; Venckauskas, A.; Wozniak, M. Smartphone User Identity Verification Using Gait Characteristics. Symmetry 2016, 8, 100. [Google Scholar] [CrossRef]
  16. Shen, C.; Tianwen, Y.; Yuan, S.; Li, Y.; Guan, X. Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones. Sensors 2016, 16, 345. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Wu, G.; Wang, J.; Zhang, Y.; Jiang, S. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics. Sensors 2018, 18, 179. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Li, Y.; Hu, H.; Zhou, G.; Deng, S. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression. IEEE Access 2018, 6, 32554–32565. [Google Scholar] [CrossRef]
  19. Li, Y.; Zou, B.; Deng, S.; Zhou, G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones. IEEE Internet Comput. 2020, 24, 49–56. [Google Scholar] [CrossRef]
  20. Saevanee, H.; Bhattarakosol, P. Authenticating User Using Keystroke Dynamics and Finger Pressure. In Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 10–13 January 2009; pp. 1–2. [Google Scholar] [CrossRef]
  21. Samet, S.; Ishraque, M.T.; Ghadamyari, M.; Kakadiya, K.; Mistry, Y.; Nakkabi, Y. TouchMetric: A machine learning based continuous authentication feature testing mobile application. Int. J. Inf. Technol. 2019, 11, 625–631. [Google Scholar] [CrossRef]
  22. Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8, 136–148. [Google Scholar] [CrossRef] [Green Version]
  23. Li, L.; Zhao, X.; Xue, G. Unobservable Re-authentication for Smartphones. In Proceedings of the 20th Network and Distributed System Security Symposium 2014, San Diego, CA, USA, 23–26 February 2017; pp. 1–16. Available online: https://www.ndss-symposium.org/wp-content/uploads/2017/09/02_1_0.pdf (accessed on 22 December 2020).
  24. Meng, W.; Wong, D.; Schlegel, R.; Kwok, L. Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. In International Conference on Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7763, pp. 331–350. [Google Scholar] [CrossRef]
  25. Peng, G.; Zhou, G.; Nguyen, D.; Qi, X.; Yang, Q.; Wang, S. Continuous Authentication With Touch Behavioral Biometrics and Voice on Wearable Glassesfs. IEEE Trans. Hum.-Mach. Syst. 2016, 47, 1–13. [Google Scholar] [CrossRef]
  26. Feng, H.; Fawaz, K. Continuous Authentication for Voice Assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing (MobiCom’17), Snowbird, UT, USA, 16–20 October 2017; pp. 343–355. [Google Scholar] [CrossRef] [Green Version]
  27. Fathy, M.; Patel, V.; Chellappa, R. Face-based Active Authentication on mobile devices. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, QLD, Australia, 19–24 April 2015; pp. 1687–1691. [Google Scholar] [CrossRef]
  28. Samangouei, P.; Patel, V.; Chellappa, R. Facial Attributes for Active Authentication on Mobile Devices. Image Vis. Comput. 2016, 58, 181–192. [Google Scholar] [CrossRef]
  29. Samangouei, P.; Chellappa, R. Convolutional neural networks for attribute-based active authentication on mobile devices. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA, 6–9 September 2016; pp. 1–8. [Google Scholar] [CrossRef] [Green Version]
  30. Mahbub, U.; Patel, V.; Chandre, D.; Barbello, B.; Chellappa, R. Partial face detection for continuous authentication. In Proceedings of the 2016 IEEE International Conference on Image Processing (ICIP), Phoenix, AZ, USA, 25–28 September 2016; pp. 2991–2995. [Google Scholar] [CrossRef] [Green Version]
  31. Perera, P.; Patel, V. Face-Based Multiple User Active Authentication on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1240–1250. [Google Scholar] [CrossRef]
  32. Kudinov, A.A.; Elsakov, S.M. Improved continuous authentication system with counterfeit protection. J. Comput. Eng. Math. 2019, 6, 35–47. [Google Scholar] [CrossRef]
  33. Chang, J.K.; Bowyer, K.; Flynn, P. Multiple Nose Region Matching for 3D Face Recognition under Varying Facial Expression. IEEE Trans. Pattern Anal. Mach. Intell. 2006, 28, 1695–1700. [Google Scholar] [CrossRef] [PubMed]
  34. Emambakhsh, M.; Evans, A.; Smith, M. Using nasal curves matching for expression robust 3D nose recognition. In Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS 2013), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8. [Google Scholar] [CrossRef]
  35. Zou, Y.; Zhao, M.; Zhou, Z.; Lin, J.; Li, M.; Wu, K. BiLock: User Authentication via Dental Occlusion Biometrics. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 1–20. [Google Scholar] [CrossRef]
  36. Cetingul, H.; Yemez, Y.; Erzin, E.; Tekalp, A. Discriminative Analysis of Lip Motion Features for Speaker Identification and Speech-Reading. IEEE Trans. Image Process. 2006, 15, 2879–2891. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  37. Isaac, M.; Bigün, J. Audio-visual person authentication using lip-motion from orientation maps. Pattern Recognit. Lett. 2007, 28, 1368–1382. [Google Scholar] [CrossRef]
  38. Mock, K.; Hoanca, B. Poster: Real-time continuous iris recognition for authentication using an eye tracker. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 1007–1009. [Google Scholar] [CrossRef]
  39. Pereira, T.; Marcel, S. Periocular biometrics in mobile environment. In Proceedings of the 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, USA, 8–11 September 2015; pp. 1–7. [Google Scholar] [CrossRef]
  40. George, A.; Routray, A. A Score-level Fusion Method for Eye Movement Biometrics. Pattern Recognit. Lett. 2016, 82, 1–5. [Google Scholar] [CrossRef] [Green Version]
  41. Mohammad, A.; Rattani, A.; Derakhshani, R. Short-Term User Authentication Using Eyebrows Biometric For Smartphone Devices. In Proceedings of the IEEE Computer Science and Electronic Engineering Conference, Colchester, UK, 19–21 September 2018; pp. 287–292. [Google Scholar] [CrossRef]
  42. Wongchoosuk, C.; Youngrod, T.; Phetmung, H.; Lutz, M.; Puntheeranurak, T.; Kerdcharoen, T. Identification of people from armpit odor region using networked electronic nose. In Proceedings of the 2011 Defense Science Research Conference and Expo, DSR 2011, Singapore, 21–25 June 2011; pp. 1–4. [Google Scholar] [CrossRef]
  43. Holz, C.; Buthpitiya, S.; Knaust, M. Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts. In Proceedings of the 33rd Annual ACM Conference, Seoul, Korea, 18–23 April 2015; pp. 3011–3014. [Google Scholar] [CrossRef]
  44. Gupta, P.; Srivastava, S.; Gupta, P. An Accurate Infrared Hand Geometry and Vein Pattern based Authentication System. Knowl.-Based Syst. 2016, 103, 143–155. [Google Scholar] [CrossRef]
  45. Shreyas, K.; Rajeev, S.; Panetta, K.; Agaian, S. Fingerprint authentication using geometric features. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 25–26 April 2017; pp. 1–7. [Google Scholar] [CrossRef]
  46. Song, Y.; Cai, Z.; Zhang, Z.L. Multi-touch Authentication Using Hand Geometry and Behavioral Information. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 357–372. [Google Scholar] [CrossRef]
  47. Bonissi, A.; Labati, R.; Perico, L.; Sassi, R.; Scotti, F.; Sparagino, L. A preliminary study on continuous authentication methods for photoplethysmographic biometrics. In Proceedings of the 2013 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BioMS 2013), Naples, Italy, 9 September 2013; pp. 28–33. [Google Scholar] [CrossRef] [Green Version]
  48. Lee, A.; Kim, Y. Photoplethysmography as a form of biometric authentication. In Proceedings of the 2015 IEEE Sensors, Busan, Korea, 1–4 November 2015; pp. 1–2. [Google Scholar] [CrossRef]
  49. Hu, J.; Mu, Z. EEG authentication system based on auto-regression coefficients. In Proceedings of the 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 7–8 January 2016; pp. 1–5. [Google Scholar] [CrossRef]
  50. Camara, C.; Peris-Lopez, P.; González-Manzano, L.; Tapiador, J. Real-time Electrocardiogram Streams for Continuous Authentication. Appl. Soft Comput. 2017, 68, 784–794. [Google Scholar] [CrossRef]
  51. Lin, F.; Song, C.; Zhuang, Y.; Xu, W.; Li, C.; Ren, K. Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System. In Proceedings of the 23rd Annual International Conference, Snowbird, UT, USA, 16–20 October 2017; pp. 315–328. [Google Scholar] [CrossRef]
  52. Barros, A.; Rosario, D.; Resque, P.; Cerqueira, E. Heart of IoT: ECG as biometric sign for authentication and identification. In Proceedings of the 15th International Wireless Communications and Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 307–312. [Google Scholar] [CrossRef]
  53. Rattani, A.; Derakhshani, R.; Ross, A. Selfie Biometrics: Advances and Challenges; Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
  54. Ying, J.J.C.; Chang, Y.J.; Huang, C.M.; Tseng, V.S. Demographic Prediction Based on User’s Mobile Behabiors. Mob. Data Chall. 2012, 2012, 1–4. [Google Scholar]
  55. Do, T.; Gatica-Perez, D. The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data. IEEE Trans. Mob. Comput. 2014, 13, 638–648. [Google Scholar] [CrossRef] [Green Version]
  56. Herder, E.; Siehndel, P.; Kawase, R. Predicting User Locations and Trajectories. In Proceedings of the User Modeling, Adaptation, and Personalization (UMAP 2014), Dublin, Ireland, 29 June–3 July 2014; Volume 8538, pp. 86–97. [Google Scholar] [CrossRef] [Green Version]
  57. Zhong, Y.; Yuan, N.; Zhong, W.; Zhang, F.; Xie, X. You Are Where You Go: Inferring Demographic Attributes from Location Check-ins. In Proceedings of the 8th ACM International Conference on Web Search and Data Mining (WSDM 2015), Shanghai, China, 31 January–6 February 2015; pp. 295–304. [Google Scholar] [CrossRef]
  58. Xie, K.; Xiong, H.; Li, C. The correlation between human mobility and socio-demographic in megacity. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–6. [Google Scholar] [CrossRef]
  59. Solomon, A.; Bar, A.; Yanai, C.; Shapira, B.; Rokach, L. Predict Demographic Information Using Word2Vec on Spatial Trajectories. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP’18), Singapore, 8–11 July 2018; pp. 331–339. [Google Scholar] [CrossRef] [Green Version]
  60. Abbasi, A.; Khan, M. Iris-pupil thickness based method for determining age group of a person. Int. Arab J. Inf. Technol. 2016, 13, 1–7. [Google Scholar]
  61. Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Gender Prediction from Mobile Ocular Images: A Feasibility Study. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 25–26 April 2017; pp. 1–6. [Google Scholar] [CrossRef]
  62. Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Convolutional Neural Network for Age Classification from Smart-phone based Ocular Images. In Proceedings of the IEEE International Joint Conference on Biometrics, Denver, CO, USA, 1–4 October 2017; pp. 756–761. [Google Scholar] [CrossRef]
  63. Rattani, A.; Donthi Reddy, N.R.; Derakhshani, R. Convolutional Neural Networks for Gender Prediction from Smartphone-based Ocular Images. IET Biom. 2018, 7, 423–430. [Google Scholar] [CrossRef]
  64. Raghavendra, R.; Stokkenes, M.; Mohammadi, A.; Venkatesh, S.; Raja, K.B.; Wasnik, P.; Poiret, E.; Marcel, S.; Busch, C. Smartphone Multi-modal Biometric Authentication: Database and Evaluation. arXiv 2019, arXiv:1912.02487. [Google Scholar]
  65. European Union. 2018 Reform of EU Data Protection Rules. Available online: https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-changes_en.pdf (accessed on 22 December 2020).
  66. European Union. Regulation on Privacy and Electronic Communications. Available online: https://ec.europa.eu/digital-single-market/en/news/proposal-regulation-privacy-and-electronic-communications (accessed on 22 December 2020).
  67. Wagner, D.; Rice, A.; Beresford, A. Device Analyzer. ACM Sigmetrics Perform. Eval. Rev. 2014, 41, 53–56. [Google Scholar] [CrossRef]
  68. Shepard, C.; Rahmati, A.; Tossell, C.; Zhong, L.; Kortum, P. LiveLab: Measuring Wireless Networks and Smartphone Users in the Field. Sigmetrics Perform. Eval. Rev. 2011, 38, 15–20. [Google Scholar] [CrossRef]
  69. Kiukkonen, N.; Blom, J.; Dousse, O.; Gatica-Perez, D.; Laurila, J.K. Towards rich mobile phone datasets: Lausanne data collection campaign. In Proceedings of the ACM Int. Conf. on Pervasive Services (ICPS), Berlin, Germany, 13–16 July 2010; pp. 1–7. [Google Scholar]
  70. Madan, A.; Cebrian, M.; Moturu, S.; Farrahi, K.; Pentland, S. Sensing the ‘Health State’ of a Community. IEEE Pervasive Comput. 2012, 11, 36–45. [Google Scholar] [CrossRef] [Green Version]
  71. Eagle, N.; (Sandy) Pentland, A. Reality Mining: Sensing Complex Social Systems. Pers. Ubiquitous Comput. 2006, 10, 255–268. [Google Scholar] [CrossRef]
  72. Mccool, C.; Marcel, S.; Abdenour, H.; Pietikainen, M.; Matejka, P.; Cernocky, J.; Poh, N.; Kittler, J.; Larcher, A.; Levy, C.; et al. Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data. In Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, Melbourne, VIC, Australia, 9–13 July 2012; pp. 635–640. [Google Scholar] [CrossRef] [Green Version]
  73. Santos, G.; Grancho, E.; Bernardo, M.; Fiadeiro, P. Fusing iris and periocular information for cross-sensor recognition. Pattern Recognit. Lett. 2015, 57, 52–59. [Google Scholar] [CrossRef]
  74. Kim, D.J.; Chung, K.W.; Hong, K.S. Person Authentication using Face, Teeth and Voice Modalities for Mobile Device Security. IEEE Trans. Consum. Electron. 2010, 56, 2678–2685. [Google Scholar] [CrossRef]
  75. Sequeira, A.F.; Monteiro, J.C.; Rebelo, A.; Oliveira, H.P. MobBIO: A multimodal database captured with a portable handheld device. In Proceedings of the 2014 International Conference on Computer Vision Theory and Applications (VISAPP), Lisbon, Portugal, 5–8 January 2014; pp. 133–139. [Google Scholar] [CrossRef]
  76. Mahbub, U.; Sarkar, S.; Patel, V.M.; Chellappa, R. Active user authentication for smartphones: A challenge data set and benchmark results. In Proceedings of the 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), Niagara Falls, NY, USA, 6–9 September 2016; pp. 1–8. [Google Scholar]
  77. Bartuzi, E.; Roszczewska, K.; Trokielewicz, M.; Bialobrzeski, R. MobiBits: Multimodal Mobile Biometric Database. arXiv 2018, arXiv:1808.10710. [Google Scholar]
  78. Govindarajan, S.; Gasti, P.; Balagani, K. Secure privacy-preserving protocols for outsourcing continuous authentication of smartphone users with touch data. In Proceedings of the 2013 IEEE 6th International Conference on Biometrics: Theory, Applications and Systems (BTAS), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8. [Google Scholar] [CrossRef]
  79. Khan, M.; Quasim, M.; Alghamdi, N.; Khan, M. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-based Medical Sensor Data. IEEE Access 2020, 8, 52018–52027. [Google Scholar] [CrossRef]
  80. Zou, X.; Du, Y.; Li, F. Secure and privacy-preserving biometrics based active authentication. In Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Korea, 14–17 October 2012; pp. 1291–1296. [Google Scholar] [CrossRef]
  81. Mwema, J.; Kimwele, M.; Kimani, S. A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates. Int. J. Comput. Trends Technol. 2015, 20, 12–18. [Google Scholar] [CrossRef]
  82. Jain, A.; Nandakumar, K.; Nagar, A. Biometric Template Security. EURASIP J. Adv. Signal Process. 2008, 2008, 1–17. [Google Scholar] [CrossRef]
  83. Gasti, P.; Sedenka, J.; Yang, Q.; Zhou, G.; Balagani, K. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2556–2571. [Google Scholar] [CrossRef]
  84. Sandhya, M.; Prasad, M. Biometric Security and Privacy: Opportunities & Challenges in The Big Data Era; Springer: Cham, Switzerland, 2017; pp. 323–370. [Google Scholar] [CrossRef]
  85. Li, S.; Jain, A. Encyclopedia of Biometrics; Springer: Cham, Switzerand, 2009. [Google Scholar] [CrossRef] [Green Version]
  86. Ghammam, L.; Barbier, M.; Rosenberger, C. Enhancing the Security of Transformation Based Biometric Template Protection Schemes. In Proceedings of the 2018 International Conference on Cyberworlds (CW), Singapore, 3–5 October 2018; pp. 316–323. [Google Scholar] [CrossRef] [Green Version]
  87. Im, J.H.; Jeon, S.Y.; Lee, M.K. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2386–2401. [Google Scholar] [CrossRef]
  88. Shin, S.; Seto, Y. Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System. In Proceedings of the Computer Information Systems and Industrial Management (CISIM 2015), Warsay, Poland, 24–26 September 2015; Volume 9339, pp. 547–558. [Google Scholar] [CrossRef] [Green Version]
  89. Nair, J.; Kumari, R. A Review on Biometric Cryptosystems. Int. J. Latest Trends Eng. Technol. 2015, 6, 46–53. [Google Scholar]
  90. Hernández Álvarez, F. Biometric Authentication for Users through Iris by Using Key Binding and Similarity Preserving Hash Functions. Ph.D. Thesis, Universidad Politécnica de Madrid, Madrid, Spain, 2015. [Google Scholar]
  91. Juels, A.; Wattenberg, M. A Fuzzy Commitment Scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS’99), Singapore, 1–4 November 1999; pp. 28–36. [Google Scholar] [CrossRef]
  92. Juels, A.; Sudan, M. A Fuzzy Vault scheme. Des. Codes Cryptogr. 2006, 38, 237–257. [Google Scholar] [CrossRef]
  93. Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 2008, 38, 97–139. [Google Scholar] [CrossRef] [Green Version]
  94. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press, Inc.: Boca Raton, FL, USA, 1996; Available online: http://cacr.uwaterloo.ca/hac/ (accessed on 22 December 2020).
  95. Paar, C.; Pelzl, J. Understanding Cryptography. A Textbook for Students and Practitioners; Springer: Heidelberg, Germany, 2010. [Google Scholar] [CrossRef]
  96. NIST. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. NIST FIPS 202. 2014. Available online: http://csrc.nist.gov/publications/drafts/fips-202/fips_202_draft.pdf (accessed on 22 December 2020).
  97. NIST. Secure Hash Standard (SHS). NIST FIPS 180-4. National Institute of Standard and Technology. 2015. Available online: https://csrc.nist.gov/publications/detail/fips/180/4/final (accessed on 22 December 2020).
  98. Daemen, V.; Rijmen, J. The Design of Rijndael: AES–The Advanced Encryption Standard; Springer: Berlin, Germany, 2002; Available online: https://www.springer.com/gp/book/9783540425809 (accessed on 22 December 2020).
  99. Bellare, M.; Rogaway, P.; Spies, T. The FFX Mode of Operation for Format-Preserving Encryption. Technical Report, Submited to NIST. 2010. Available online: https://csrc.nist.gov/csrc/media/projects/block-cipher-techniques/documents/bcm/proposed-modes/ffx/ffx-spec.pdf (accessed on 22 December 2020).
  100. Gayoso Martínez, V.; Hernández Encinas, L.; Martín Muñoz, A.; de Fuentes, J.M.; González Manzano, L. Cifrado de datos con preservación del formato. In Proceedings of the Primeras Jornadas Nacionales de Investigación en Ciberseguridad (JNIC), Leon, Spain, 14–16 September 2015; pp. 110–115. [Google Scholar]
  101. Rodríguez Cesar, H.; Gayoso Martínez, V.; Hernández Encinas, L.; Martín Muñoz, A. Format-Preserving Encryption: Image Encryption Under FF1 Scheme. Int. J. Adv. Electron. Comput. Sci. (IJAECS) 2019, 6, 1–4. [Google Scholar]
  102. Hernández-Álvarez, L.; de Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. SmartCAMPP—Smartphone-based Continuous Authentication leveraging Motion sensors with Privacy Preservation. Pattern Recognit. Lett. 2020. submitted. [Google Scholar]
  103. Rivest, R.; Shamir, A.; Adleman, L.M. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
  104. Benaloh, J.C. Secret sharing homomorphisms: Keeping shares of a secret secret. In Proceedings of the Advances in Cryptology–CRYPTO’86, Santa Barbara, CA, USA, 18–22 August 1986; Volume 263, pp. 251–260. [Google Scholar] [CrossRef] [Green Version]
  105. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the Advances in Cryptology–EUROCRYPT’99, Prague, Czech Republic, 2–6 May 1999; Volume 1592, pp. 223–238. [Google Scholar] [CrossRef] [Green Version]
  106. Singh, V.K.; Dutta, M. Analyzing Cryptographic Algorithms for Secure Cloud Network. Int. J. Adv. Stud. Comput. Sci. Eng. 2014, 3, 1–9. [Google Scholar]
  107. Al-Rubaie, M. Towards Privacy-Aware Mobile-Based Continuous Authentication Systems. Ph.D. Thesis, Iowa State University, Ames, IA, USA, 2018. [Google Scholar]
  108. Song, X.; Chen, Z.; Sun, D. Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption. J. Inf. Process. Syst. 2020, 16, 599–611. [Google Scholar] [CrossRef]
  109. Shahandashti, S.; Safavi-Naini, R.; Safa, N. Reconciling User Privacy and Implicit Authentication for Mobile Devices. Comput. Secur. 2015, 53, 215–233. [Google Scholar] [CrossRef]
  110. Nandakumar, K.; Jain, A. Biometric Template Protection: Bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 2015, 32, 88–100. [Google Scholar] [CrossRef] [Green Version]
  111. Noorman, J.; Muehlberg, J.; Piessens, F. Authentic Execution of Distributed Event-Driven Applications with a Small TCB. In Proceedings of the International Workshop on Security and Trust Management, Oslo, Norway, 14–15 September 2017; pp. 55–71. [Google Scholar] [CrossRef]
  112. Sun, Y.; Upadhyaya, S. Secure and privacy preserving data processing support for active authentication. Inf. Syst. Front. 2015, 17, 1007–1015. [Google Scholar] [CrossRef]
  113. Vassallo, G.; Van Hamme, T.; Preuveneers, D.; Joosen, W. Privacy-Preserving Behavioral Authentication on Smartphones. In Proceedings of the First International Workshop on Human-Centered Sensing, Networking, and Systems, Delft, The Netherlands, 5 November 2017; pp. 1–6. [Google Scholar] [CrossRef]
  114. Hatin, J.; Cherrier, E.; Schwartzmann, J.J.; Rosenberger, C. Privacy Preserving Transparent Mobile Authentication. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 19–21 February 2017; pp. 354–361. [Google Scholar] [CrossRef]
  115. Leggett, J.; Williams, G.; Usnick, M.; Longnecker, M. Dynamic Identity Verification via Keystroke Characteristics. Int. J. Man.-Mach. Stud. 1991, 35, 859–870. [Google Scholar] [CrossRef]
  116. Alvarez, G.; Hernández Encinas, L.; Martín del Rey, A. A multisecret sharing scheme for color images based on cellular automata. Inf. Sci. 2008, 178, 4382–4395. [Google Scholar] [CrossRef] [Green Version]
  117. Blakley, G. Safeguarding cryptographic keys. In Proceedings of the AFIPS National Computer Conference, New York, NY, USA, 4–7 June 1979; pp. 313–317. [Google Scholar] [CrossRef]
  118. Shamir, A. How to Share a Secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  119. Yao, A. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science, Toronto, ON, Canada, 27–29 October 1986; pp. 162–167. [Google Scholar] [CrossRef]
  120. Zhao, C.; Zhao, S.; Zhao, M.; Chen, Z.; Gao, C.Z.; Lif, H.; Tan, Y.A. Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 2019, 476, 357–372. [Google Scholar] [CrossRef]
  121. Blum, M.; Feldman, P.; Micali, S. Non-Interactive Zero-Knowledge and Its Applications. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC 1988), Chicago, IL, USA, 2–5 May 1988; pp. 103–112. [Google Scholar] [CrossRef]
  122. Quisquater, J.J.; Guillou, L.C.; Berson, T.A. How to Explain Zero-Knowledge Protocols to Your Children. In Proceedings of the Advances in Cryptology–CRYPTO’89, Santa Barbara, CA, USA, 20–24 August 1990; Volume 435, pp. 628–631. [Google Scholar] [CrossRef] [Green Version]
  123. Goh, A.; Ngo, D. Computation of Cryptographic Keys from Face Biometrics. In Proceedings of the IFIP International Conference on Communications and Multimedia Security, Torino, Italy, 2–3 October 2003; pp. 1–13. [Google Scholar] [CrossRef] [Green Version]
  124. Kikuchi, H.; Nagai, K.; Ogata, W.; Nishigaki, M. Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput. 2010, 14, 529–536. [Google Scholar] [CrossRef]
  125. Corcoran, P.; Costache, C. Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts. In Proceedings of the 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 11–12 November 2015; pp. 1–7. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Features scheme for sensor-based user authentication.
Figure 1. Features scheme for sensor-based user authentication.
Sensors 21 00092 g001
Table 1. Sensor-based Continuous authentication (CA) literature summary (Acc: Accuracy, AUC: Area Under the Curve, BN: Bayesian Networks, BPNN: Back Propagation Neural Network, CNN: Convolutional Neural Networks, CRR: Correct Recognition Rate, DT: Decision Tree, EER: Equal Error Rate, EF: Eigenfaces, ER: Error Rate, FAR: False Acceptance Rate, FF: Fischerfaces, FRR: False Rejection Rate, GMM: Gaussian Mixture Model, HAT: Hoeffding Adaptive Trees, HOG: Histogram of Oriented Gradients, HTER: Half Total Error Rates, HMM: Hidden Markov Model, KFA: Kernel-Fisher’s Analysis, KNN: K-Nearest Neighbor, KRR: Kernel Ridge Regression, LDA: Linear Discriminant Analysis, LMNN: Large Margin Nearest Neighbor, LSTM: Long Short-Term Memory, ML: Machine Learning, MLP: Multi-Layer Perceptrons, NB: Naive Bayes, NN: Neural Network, PCA: Principal Component Analysis, RBF: Radial Basis Function, RF: Random Forest, SIFT: Scale-Invariant Feature Transform, SRC: Sparse Representation Classification, SVM: Support Vector Machine, TNR: True Negative Rate, TPR: True Positive Rate).
Table 1. Sensor-based Continuous authentication (CA) literature summary (Acc: Accuracy, AUC: Area Under the Curve, BN: Bayesian Networks, BPNN: Back Propagation Neural Network, CNN: Convolutional Neural Networks, CRR: Correct Recognition Rate, DT: Decision Tree, EER: Equal Error Rate, EF: Eigenfaces, ER: Error Rate, FAR: False Acceptance Rate, FF: Fischerfaces, FRR: False Rejection Rate, GMM: Gaussian Mixture Model, HAT: Hoeffding Adaptive Trees, HOG: Histogram of Oriented Gradients, HTER: Half Total Error Rates, HMM: Hidden Markov Model, KFA: Kernel-Fisher’s Analysis, KNN: K-Nearest Neighbor, KRR: Kernel Ridge Regression, LDA: Linear Discriminant Analysis, LMNN: Large Margin Nearest Neighbor, LSTM: Long Short-Term Memory, ML: Machine Learning, MLP: Multi-Layer Perceptrons, NB: Naive Bayes, NN: Neural Network, PCA: Principal Component Analysis, RBF: Radial Basis Function, RF: Random Forest, SIFT: Scale-Invariant Feature Transform, SRC: Sparse Representation Classification, SVM: Support Vector Machine, TNR: True Negative Rate, TPR: True Positive Rate).
FeaturesReferenceTechniqueDatasetBest Result
Device Interacion[11], 2018NB, KNN, HATSherLock Dataset A c c = 97.05 %
Motion[15], 2016Random ProyectionsUSC Human Activity Dataset E E R = 5.7 %
[16], 2016SVM, NN, KNNWork-specific F A R = 3.92 % , F R R = 4.97 %
[13], 2017DT, BN, KNN, SVMWork-specific A c c = 99.18 %
[18], 2018SVM, KRRMulti-Modal Dataset E E R = 3.0 %
[17], 2018SVM, KNN, DTWork-specific A c c = 98.74 % , F A R = 4.69 % , F R R = 4.95 %
[12], 2019SVM, DT, RFMobiAct, HAR, PAMAP2 A c c = 99.81 %
[19], 2020SVMWork-specific M e a n B a l a n c e d E R = 1.47 %
[14], 2020LSTMWork-specific F - 1 = 98 % , F A R = 0.95 % ,
F R R = 6.67 % , E E R = 0.41 %
Touch Dynamics[24], 2012DT, NB, Kstar, RBF, BPNNWork-specific E E R = 2.92 %
[22], 2013SVM, KNNWork-specific E E R = 0 4 %
[23], 2013SVMWork-specific A c c = 95.78 %
[25], 2016SVMWork-specific A c c = 99 % , F A R = 0.5 %
[21], 2019Several ML classifiersWork-specific A c c = 100 % , F R R = 0 % , F A R = 0 %
[14], 2020LSTMWork-specific F - 1 = 98 % , F A R = 0.95 % ,
F R R = 6.67 % , E E R = 0.41 %
Voice[25], 2016SVMWork-specific A c c = 99 % , F A R = 0.5 %
[26], 2017SVMWork-specific A c c = 97 % , F A R = 0.09 %
Face[27], 2015EF, FF, LMNN, SRCWork-specific A c c = 96.96 %
[28], 2016SVMMOBIO, AA01 E E R = 0.11 %
[29], 2016CNNMOBIO, AA01 E E R = 0.17 %
[30], 2016SVMAA01 T P R = 0.5635 % , R e c a l l = 0.6372 %
[31], 2018SVMMOBIO, UMDAA01, UMDAA02 A c c = 94 % , T P R = 0.96 % , T N R = 0.92 %
[32], 2019CNN ResNetYouTube E E R = 0.86 %
Nose[33], 2006Feature matchingWork-specific R a n k - 1 = 96.6 %
[34], 2013PCA, LDA, KFA, SVM, DTFRGCv2.0 A c c = 99.32 %
Teeth[35], 2018Feature matching, SVMWork-specific F R R = 2.1 % , F A R = 3.1 %
Lip Motion[36], 2006HMMMVGL-AVD E E R = 1.6 %
[37], 2007Feature matchingXM2VTS A c c = 98 %
Ocular[38], 2012Daugman’s algorithm, KNNWork-specific A c c = 100 % , E E R = 9 %
[39], 2015GMMMOBIO, CPqD H T E R = 7.27 %
[40], 2015RBFBioEye 2015 R 1 A c c = 98.69 %
[41], 2018SVM, GIST and HOG descriptorsVISOB, FERET E E R = 1.08 % , A U C = 0.999
Bodyprints[42], 2011PCAWork-specific95% Confidence Ellipse
[43], 2015SURF detector/descriptorWork-specific A c c = 99.8 % , F R R = 7.8 %
[44], 2016Feature matchingWork-specific C R R = 90.66 % , E E R = 11.93 %
[45], 2017SIFT descriptorNeurotechnology E E R = 0.8 %
[46], 2017SVM, KNNWork-specific E E R = 1.88 %
Physiological[47], 2013Feature matchingWork-specific E E R = 9 %
[48], 2015Feed-forward NNWork-specific A c c = 95.1 % , F A R = 4.2 % , F R R = 3.7 %
[49], 2016Event Related PotentialsWork-specific A c c = 92.93 %
[50], 2017KNNMIT-BIH Normal Sinus Rhythm A c c = 84.8 %
[51], 2017SVMWork-specific A c c = 98.61 % , E E R = 4.42 %
[52], 2019NB, MLP, RF, SVMPhysioNet A c c = 99.92 %
Table 2. Sensor-based User Profiling (UP) literature summary (Acc: Accuracy, AUC: Area Under the Curve, CNN: Convolutional Neural Networks, CV: Computer Vision, DT: Decision Tree, LR: Logistic Regression, MLP: Multi-Layer Perceptrons, MM: Markov Model, NB: Naive Bayes, SVM: Support Vector Machine).
Table 2. Sensor-based User Profiling (UP) literature summary (Acc: Accuracy, AUC: Area Under the Curve, CNN: Convolutional Neural Networks, CV: Computer Vision, DT: Decision Tree, LR: Logistic Regression, MLP: Multi-Layer Perceptrons, MM: Markov Model, NB: Naive Bayes, SVM: Support Vector Machine).
FeaturesReferenceTechniqueDatasetPredicted AttributeBest Result
GPS[54], 2012SVM, DT, NB, LR, MLPMDC DatasetGender, age, marital status, job A c c = 82.05 %
[55], 2014Place LabelingLausanne Data Collection CampaignVisiting patterns A c c = 75 %
[56], 2014Simple MM, Top-N LocationsGeoLife GPS Trajectory DatasetFuture Location A c c = 93 %
[57], 2015Location2ProfileWork-specificGender, age, blood type, education background, marital status, zodiac sign, sexual orientation A U C = 90.51 %
[58], 2016Trajectories, displacements, radius of gyration5th Urban Traffic Survey of BeijingGender, ageStatistical Test
[59], 2018Word2VecSherLock, CARSGender, age range, marital status, children, academic faculty A c c = 83 %
Ocular[60], 2016Analysis of varianceCASIA 4.0 DatasetsAge rangeStatistical Test
[61], 2017CV, SVM, MLPVISOBGender, age A c c = 91.60 %
[62], 2017CNNAdienceGender, age A c c = 46.97 %
[63], 2018CNN, SVM, MLPVISOBGender, age A c c = 90 %
Table 3. Privacy-preserving CA literature summary (BC: BioCapsule, DCA: Discriminant Component Analysis, KNN: K-Nearest Neighbor, LR: Logistic Regression, MDR: Multiclass Discriminant Ration, RF: Random Forest, SVM: Support Vector Machine).
Table 3. Privacy-preserving CA literature summary (BC: BioCapsule, DCA: Discriminant Component Analysis, KNN: K-Nearest Neighbor, LR: Logistic Regression, MDR: Multiclass Discriminant Ration, RF: Random Forest, SVM: Support Vector Machine).
FeaturesReferenceTechniqueDatasetPrivacy-Preserving Approach
Touch Dynamics[78], 2013Manhattan and Euclidean distancesTouch DatasetHomomorphic and symmetric encryption
[112], 2015Algorithm of [115]Work-specificSensitive information removal
[113], 2017Mean distance rulesMOBIKEYPermutation, substitution and suppression
Device Interaction[109], 2015Homomorphic operationsWork-specificHomomorphic and order preserving encryption
[114], 2017KNN, SVMWork-specificCancelable biometrics (biohashing)
[102], 2020SVM, RF, LRSherLock DatasetFormat-Preserving Encryption
Unspecified[80], 2012BCWork-specificCancelable biometrics
[83], 2016Manhattan and Hamming distancesWork-specificGarbled circuits
[107], 2018DCA, MDRTouchalyticsCancelable biometrics
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hernández-Álvarez, L.; de Fuentes, J.M.; González-Manzano, L.; Hernández Encinas, L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors 2021, 21, 92. https://doi.org/10.3390/s21010092

AMA Style

Hernández-Álvarez L, de Fuentes JM, González-Manzano L, Hernández Encinas L. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors. 2021; 21(1):92. https://doi.org/10.3390/s21010092

Chicago/Turabian Style

Hernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano, and Luis Hernández Encinas. 2021. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review" Sensors 21, no. 1: 92. https://doi.org/10.3390/s21010092

APA Style

Hernández-Álvarez, L., de Fuentes, J. M., González-Manzano, L., & Hernández Encinas, L. (2021). Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review. Sensors, 21(1), 92. https://doi.org/10.3390/s21010092

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop