Mobile Information Systems / 2018 / Article / Tab 5

Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Table 5

Synopsis of behavioral biometrics.

ModalitiesAuthentication typesUsability pros and cons indicatedSecurity solutions or concerns reported

Touch [9, 113]; keystroke [115]; hold [8]; gait [116118]; behavior profiling [119]Adaptive; continuous; multimodal; risk-based; transparent[3, 5, 10, 113, 119121][8, 12, 29, 112, 113, 115117, 122127]