ADVANCED REVIEW Continuous authentication using biometrics: An advanced review Gabriel Dahia | Leone Jesus | Maurício Pamplona Segundo Department of Computer Science, Universidade Federal da Bahia, Brazil Correspondence Maurício Pamplona Segundo, Department of Computer Science, Universidade Federal da Bahia, Salvador, Brazil. Email: mauriciops@ufba.br Abstract The shortcomings of conventional access control systems for high-security environments have led to the concert of continuous authentication. Contrary to traditional verification, in which users are authenticated only once at the start of their session, continuous authentication systems regularly check users' identities to prevent hijackings. The challenges in this area involve balancing the security of protected assets by quickly detecting intruders with the system usability for genuine users. Biometric recognition plays a major role within this context, as it is the main way to assure that users are who they claim to be. A comparative analysis of the latest works revealed different aspects of this problem. First, some biometrics traits among those applied for continuous authentication are more suitable for this task than others. Second, systems combining multiple traits have advantages over those relying on a single one. Finally, many works fail to report proper evaluation metrics. With this in mind, we were able to identify new opportunities for researchers in the field. We highlight the potential for mining new datasets on the internet, which would benefit validation and benchmarking, and how recent deep learning techniques could address some of the open challenges in the area. This article is categorized under: Technologies > Prediction Technologies > Machine Learning Application Areas > Science and Technology KEYWORDS Access control, biometric recognition, continuous authentication 1 | INTRODUCTION The protection of different resources, such as valuable assets, facilities or information, against malevolent acts (e.g., theft, sabotage, vandalism) is an old human concern that led to the creation and development of access control methods. Access control consists of recognizing authorized userspeople that meet the necessary conditions to manage or use a resourceand defining what resources a user is allowed to use (Sandhu & Samarati, 1994). The research community has proposed using biometric recognition, or biometrics, to improve the security in access control systems. This is because previous authentication methods, like passwords, keys, and cards, are much easier to circumvent. Besides the possibility of losing or forgetting authentication forms based on knowledge or objects, they can Received: 30 September 2019 Revised: 10 January 2020 Accepted: 22 February 2020 DOI: 10.1002/widm.1365 WIREs Data Mining Knowl Discov. 2020;e1365. wires.wiley.com/dmkd © 2020 Wiley Periodicals, Inc. 1 of 23 https://doi.org/10.1002/widm.1365