Continuous user authentication in mobile device and IoT environment

The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, th...

Full description

Saved in:
Bibliographic Details
Main Author: Liu, Allen Yang
Other Authors: Ng Wee Keong
Format: Thesis-Master by Research
Language:English
Published: Nanyang Technological University 2020
Subjects:
Online Access:https://hdl.handle.net/10356/143089
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-143089
record_format dspace
spelling sg-ntu-dr.10356-1430892020-10-28T08:29:14Z Continuous user authentication in mobile device and IoT environment Liu, Allen Yang Ng Wee Keong School of Computer Science and Engineering AWKNG@ntu.edu.sg Engineering::Computer science and engineering::Information systems::Information systems applications The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, the hackers can cause $2,300 in fraud losses every hour by phishing or other hacking methods. The password leak and account takeover are serious security problems in financial industry. We aim to create continuous authentication methods in mobile devices and IoT environment which allows user to authenticate without the burden of credential requests. Thus, creating a secure, user-friendly experience for the user. We have proposed two methods to authenticate users in two different scenarios, which are mobile device environment and IoT environment. Both of the two methods are proposed to authenticate user in the background by learning their behaviours, and building their unique profiles. And machine learning techniques are applied for information discovery from the behaviour data to make authentication decisions. Master of Engineering 2020-07-30T02:18:05Z 2020-07-30T02:18:05Z 2020 Thesis-Master by Research Liu, A. Y. (2020). Continuous user authentication in mobile device and IoT environment. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/143089 10.32657/10356/143089 en This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0). application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Information systems::Information systems applications
spellingShingle Engineering::Computer science and engineering::Information systems::Information systems applications
Liu, Allen Yang
Continuous user authentication in mobile device and IoT environment
description The conventional authentication methods, such as password authentication, fingerprint recognition and face recognition, have many drawbacks and disadvantages. The conventional authentication methods are snapshot and one-time authentication with a very high risk of being hacked. In the early days, the hackers can cause $2,300 in fraud losses every hour by phishing or other hacking methods. The password leak and account takeover are serious security problems in financial industry. We aim to create continuous authentication methods in mobile devices and IoT environment which allows user to authenticate without the burden of credential requests. Thus, creating a secure, user-friendly experience for the user. We have proposed two methods to authenticate users in two different scenarios, which are mobile device environment and IoT environment. Both of the two methods are proposed to authenticate user in the background by learning their behaviours, and building their unique profiles. And machine learning techniques are applied for information discovery from the behaviour data to make authentication decisions.
author2 Ng Wee Keong
author_facet Ng Wee Keong
Liu, Allen Yang
format Thesis-Master by Research
author Liu, Allen Yang
author_sort Liu, Allen Yang
title Continuous user authentication in mobile device and IoT environment
title_short Continuous user authentication in mobile device and IoT environment
title_full Continuous user authentication in mobile device and IoT environment
title_fullStr Continuous user authentication in mobile device and IoT environment
title_full_unstemmed Continuous user authentication in mobile device and IoT environment
title_sort continuous user authentication in mobile device and iot environment
publisher Nanyang Technological University
publishDate 2020
url https://hdl.handle.net/10356/143089
_version_ 1683493949659938816