Continuous user authentication in mobile device and IoT environment

The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, th...

全面介紹

Saved in:
書目詳細資料
主要作者: Liu, Allen Yang
其他作者: Ng Wee Keong
格式: Thesis-Master by Research
語言:English
出版: Nanyang Technological University 2020
主題:
在線閱讀:https://hdl.handle.net/10356/143089
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
實物特徵
總結:The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, the hackers can cause $2,300 in fraud losses every hour by phishing or other hacking methods. The password leak and account takeover are serious security problems in financial industry. We aim to create continuous authentication methods in mobile devices and IoT environment which allows user to authenticate without the burden of credential requests. Thus, creating a secure, user-friendly experience for the user. We have proposed two methods to authenticate users in two different scenarios, which are mobile device environment and IoT environment. Both of the two methods are proposed to authenticate user in the background by learning their behaviours, and building their unique profiles. And machine learning techniques are applied for information discovery from the behaviour data to make authentication decisions.