Machine Learning Algorithms In User Authentication Schemes

10/15/2021
by   Laura Pryor, et al.
0

In the past two decades, the number of mobile products being created by companies has grown exponentially. However, although these devices are constantly being upgraded with the newest features, the security measures used to protect these devices has stayed relatively the same over the past two decades. The vast difference in growth patterns between devices and their security is opening up the risk for more and more devices to easily become infiltrated by nefarious users. Working off of previous work in the field, this study looks at the different Machine Learning algorithms used in user authentication schemes involving touch dynamics and device movement. This study aims to give a comprehensive overview of the current uses of different machine learning algorithms that are frequently used in user authentication schemas involving touch dynamics and device movement. The benefits, limitations, and suggestions for future work will be thoroughly discussed throughout this paper.

READ FULL TEXT
research
04/19/2022

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Mobile devices have been manufactured and enhanced at growing rates in t...
research
01/21/2022

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

In recent years the amount of secure information being stored on mobile ...
research
05/07/2022

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

The amount of secure data being stored on mobile devices has grown immen...
research
04/08/2023

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Cyber attacks has always been of a great concern. Websites and services ...
research
08/16/2021

Happy MitM: Fun and Toys in Every Bluetooth Device

Bluetooth pairing establishes trust on first use between two devices by ...
research
09/06/2021

IoT Security and Authentication schemes Based on Machine Learning: Review

With the latest developments in technology, extra and extra human beings...
research
07/27/2022

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

As technology grows and evolves rapidly, it is increasingly clear that m...

Please sign up or login with your details

Forgot password? Click here to reset