Recent Advancements in Continuous
Authentication Techniques
for Mobile-Touchscreen-Based Devices
Rupanka Bhuyan, S. Pradeep Kumar Kenny, Samarjeet Borah,
Debahuti Mishra, and Kaberi Das
Abstract Mobile devices have proliferated into every area of activity in our lives
today. Other than its use as a tool for communication and entertainment, it has also
exhibited its importance as a device for conducting financial transactions, maintaining
social profiles, storing and sharing confidential data. Owing to this criticality, there is
an imminent need to provide security to this device at all levels. One type of security
is Onetime User Authentication (OUA) for logging in to the device; the other being
Continuous Authentication (CA) which is used for continuously and unobtrusively
authenticating a user while the device is being used. If any unauthorized user bypasses
the first type of security barrier, the second level of security, i.e., CA can act as the
last line of defense for protecting the device. Although a good number of works have
been carried out in this domain during the past decade, in this paper, we primarily
elaborate on the direction of progress and developments that have taken place in the
recent past.
Keywords Mobile devices · Touchstrokes · User authentication · Continuous
authentication · Features
R. Bhuyan · S. P. K. Kenny
Department of Computer Science, St. Joseph University, Dimapur, Nagaland, India
e-mail: rupanka@yahoo.com
S. P. K. Kenny
e-mail: kenny_isles@yahoo.co.in
S. Borah
Department of Computer Applications, Sikkim Manipal Institute of Technology, Majhitar,
Rangpo, Sikkim, India
e-mail: samarjeetborah@gmail.com
D. Mishra (B ) · K. Das
Siksha ‘O’ Anusandhan (Deemed to be) University, Bhubaneswar, Odisha, India
e-mail: debahutimishra@soa.ac.in
K. Das
e-mail: kaberidas@soa.ac.in
© Springer Nature Singapore Pte Ltd. 2021
D. Mishra et al. (eds.), Intelligent and Cloud Computing,
Smart Innovation, Systems and Technologies 194,
https://doi.org/10.1007/978-981-15-5971-6_29
263