JOURNAL ARTICLE

Behavioral Biometrics for Continuous Authentication

Abstract

Smartphones, tablets, laptops and PCs have brought across the revolution of always on, always connected. They have become ubiquitous in our lives. Smartphones and tablets combine and extend the functionality of feature phones and desktop computers. They give us an opportunity to play, work and socialize whenever and wherever we want. It has now become a standard and an everyday gadget. We use it for everything and thus it has the most private and sensitive information. It has become susceptible to a lot of privacy issues if it reaches the hand of an outsider. There exist a potential risks if our mobile phones get stolen or are ceased by an intruder. Mostly these devices have a one-step authentication process which consists of the initial login i.e. input of ID and password by the user to gain total access. But this doesn't take into consideration the situation of who accesses the device after the initial login. The detection of a fraudulent access isn't taken into consideration. To deal with this problem, continuous authentication is becoming quite popular in which the user is continuously monitored after the initial login authentication process is completed. This paper highlights the various continuous authentication methods which can be used to monitor our devices and analyze the current research, proposed framework and mechanisms that can be implemented or have already been implemented.

Keywords:
Login Computer science Computer security Gadget Authentication (law) Password Process (computing) Biometrics Internet privacy Malware Mobile device Hacker World Wide Web Operating system

Metrics

6
Cited By
0.00
FWCI (Field Weighted Citation Impact)
25
Refs
0.34
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Behavioral Biometrics for Continuous Authentication

Ms. Shabana. K

Journal:   INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT Year: 2025 Vol: 09 (05)Pages: 1-9
JOURNAL ARTICLE

Behavioral Biometrics for Continuous Authentication

Anvesh GunugantiUSA

Journal:   Journal of Biosensors and Bioelectronics Research Year: 2023 Pages: 1-5
JOURNAL ARTICLE

Continuous Authentication Using Behavioral Biometrics

Ingo DeutschmannPeder NordströmLinus Nilsson

Journal:   IT Professional Year: 2013 Vol: 15 (4)Pages: 12-15
© 2026 ScienceGate Book Chapters — All rights reserved.