Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices Rupanka Bhuyan, S. Pradeep Kumar Kenny, Samarjeet Borah, Debahuti Mishra, and Kaberi Das Abstract Mobile devices have proliferated into every area of activity in our lives today. Other than its use as a tool for communication and entertainment, it has also exhibited its importance as a device for conducting financial transactions, maintaining social profiles, storing and sharing confidential data. Owing to this criticality, there is an imminent need to provide security to this device at all levels. One type of security is Onetime User Authentication (OUA) for logging in to the device; the other being Continuous Authentication (CA) which is used for continuously and unobtrusively authenticating a user while the device is being used. If any unauthorized user bypasses the first type of security barrier, the second level of security, i.e., CA can act as the last line of defense for protecting the device. Although a good number of works have been carried out in this domain during the past decade, in this paper, we primarily elaborate on the direction of progress and developments that have taken place in the recent past. Keywords Mobile devices · Touchstrokes · User authentication · Continuous authentication · Features R. Bhuyan · S. P. K. Kenny Department of Computer Science, St. Joseph University, Dimapur, Nagaland, India e-mail: rupanka@yahoo.com S. P. K. Kenny e-mail: kenny_isles@yahoo.co.in S. Borah Department of Computer Applications, Sikkim Manipal Institute of Technology, Majhitar, Rangpo, Sikkim, India e-mail: samarjeetborah@gmail.com D. Mishra (B ) · K. Das Siksha ‘O’ Anusandhan (Deemed to be) University, Bhubaneswar, Odisha, India e-mail: debahutimishra@soa.ac.in K. Das e-mail: kaberidas@soa.ac.in © Springer Nature Singapore Pte Ltd. 2021 D. Mishra et al. (eds.), Intelligent and Cloud Computing, Smart Innovation, Systems and Technologies 194, https://doi.org/10.1007/978-981-15-5971-6_29 263