Cargando…

A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones

Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to resources in a mobile device. NIST states that password schemes and/or biometrics comprise the most conventi...

Descripción completa

Detalles Bibliográficos
Autores principales: Papaioannou, Maria, Pelekoudas-Oikonomou, Filippos, Mantas, Georgios, Serrelis, Emmanouil, Rodriguez, Jonathan, Fengou, Maria-Anna
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10056427/
https://www.ncbi.nlm.nih.gov/pubmed/36991690
http://dx.doi.org/10.3390/s23062979
_version_ 1785016118765682688
author Papaioannou, Maria
Pelekoudas-Oikonomou, Filippos
Mantas, Georgios
Serrelis, Emmanouil
Rodriguez, Jonathan
Fengou, Maria-Anna
author_facet Papaioannou, Maria
Pelekoudas-Oikonomou, Filippos
Mantas, Georgios
Serrelis, Emmanouil
Rodriguez, Jonathan
Fengou, Maria-Anna
author_sort Papaioannou, Maria
collection PubMed
description Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to resources in a mobile device. NIST states that password schemes and/or biometrics comprise the most conventional user authentication mechanisms for mobile devices. Nevertheless, recent studies point out that nowadays password-based user authentication is imposing several limitations in terms of security and usability; thus, it is no longer considered secure and convenient for the mobile users. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Alternatively, biometric-based user authentication has gained attention as a promising solution for enhancing mobile security without sacrificing usability. This category encompasses methods that utilize human physical traits (physiological biometrics) or unconscious behaviors (behavioral biometrics). In particular, risk-based continuous user authentication, relying on behavioral biometrics, appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we firstly present fundamentals on risk-based continuous user authentication, relying on behavioral biometrics on mobile devices. Additionally, we present an extensive overview of existing quantitative risk estimation approaches (QREA) found in the literature. We do so not only for risk-based user authentication on mobile devices, but also for other security applications such as user authentication in web/cloud services, intrusion detection systems, etc., that could be possibly adopted in risk-based continuous user authentication solutions for smartphones. The target of this study is to provide a foundation for organizing research efforts toward the design and development of proper quantitative risk estimation approaches for the development of risk-based continuous user authentication solutions for smartphones. The reviewed quantitative risk estimation approaches have been divided into the following five main categories: (i) probabilistic approaches, (ii) machine learning-based approaches, (iii) fuzzy logic models, (iv) non-graph-based models, and (v) Monte Carlo simulation models. Our main findings are summarized in the table in the end of the manuscript.
format Online
Article
Text
id pubmed-10056427
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100564272023-03-30 A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones Papaioannou, Maria Pelekoudas-Oikonomou, Filippos Mantas, Georgios Serrelis, Emmanouil Rodriguez, Jonathan Fengou, Maria-Anna Sensors (Basel) Article Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to resources in a mobile device. NIST states that password schemes and/or biometrics comprise the most conventional user authentication mechanisms for mobile devices. Nevertheless, recent studies point out that nowadays password-based user authentication is imposing several limitations in terms of security and usability; thus, it is no longer considered secure and convenient for the mobile users. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Alternatively, biometric-based user authentication has gained attention as a promising solution for enhancing mobile security without sacrificing usability. This category encompasses methods that utilize human physical traits (physiological biometrics) or unconscious behaviors (behavioral biometrics). In particular, risk-based continuous user authentication, relying on behavioral biometrics, appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we firstly present fundamentals on risk-based continuous user authentication, relying on behavioral biometrics on mobile devices. Additionally, we present an extensive overview of existing quantitative risk estimation approaches (QREA) found in the literature. We do so not only for risk-based user authentication on mobile devices, but also for other security applications such as user authentication in web/cloud services, intrusion detection systems, etc., that could be possibly adopted in risk-based continuous user authentication solutions for smartphones. The target of this study is to provide a foundation for organizing research efforts toward the design and development of proper quantitative risk estimation approaches for the development of risk-based continuous user authentication solutions for smartphones. The reviewed quantitative risk estimation approaches have been divided into the following five main categories: (i) probabilistic approaches, (ii) machine learning-based approaches, (iii) fuzzy logic models, (iv) non-graph-based models, and (v) Monte Carlo simulation models. Our main findings are summarized in the table in the end of the manuscript. MDPI 2023-03-09 /pmc/articles/PMC10056427/ /pubmed/36991690 http://dx.doi.org/10.3390/s23062979 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Papaioannou, Maria
Pelekoudas-Oikonomou, Filippos
Mantas, Georgios
Serrelis, Emmanouil
Rodriguez, Jonathan
Fengou, Maria-Anna
A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title_full A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title_fullStr A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title_full_unstemmed A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title_short A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones
title_sort survey on quantitative risk estimation approaches for secure and usable user authentication on smartphones
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10056427/
https://www.ncbi.nlm.nih.gov/pubmed/36991690
http://dx.doi.org/10.3390/s23062979
work_keys_str_mv AT papaioannoumaria asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT pelekoudasoikonomoufilippos asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT mantasgeorgios asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT serrelisemmanouil asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT rodriguezjonathan asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT fengoumariaanna asurveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT papaioannoumaria surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT pelekoudasoikonomoufilippos surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT mantasgeorgios surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT serrelisemmanouil surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT rodriguezjonathan surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones
AT fengoumariaanna surveyonquantitativeriskestimationapproachesforsecureandusableuserauthenticationonsmartphones