Review Article

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Table 1

Related surveys on biometric authentication.

Reference Deployment scope Focus biometric area Threat models Countermeasures ML and DM

Gafurov (2007) [8] Not mobile Gait recognition No No No

Revett et al. (2008) [9] Not mobile Mouse dynamics No No No

Yampolskiy and Govindaraju (2008) [10] Not mobile Behavioral-based No No No

Shanmugapriya and Padmavathi (2009) [11] Not mobile Keystroke dynamics No No Yes

Karnan et al. (2011) [12] Not mobile Keystroke dynamics No No Yes

Banerjee and Woodard (2012) [13] Not mobile Keystroke dynamics No No Yes

Teh et al. (2013) [14] Not mobile Keystroke dynamics No No Yes

Bhatt et al. (2013) [15] Not mobile Keystroke dynamics No No Yes

Meng et al. (2015) [16] Mobile device All Yes Yes Partial

Teh et al. (2016) [17] Mobile device Touch dynamics No No Yes

Mahfouz et al. (2017) [18] Smartphone behavioral-based No No Yes

Mahadi et al. (2018) [19] Not mobilebehavioral-based No No Yes

Sundararajan and Woodard (2018) [20] Not mobile AllNoNo Yes

Rattani and Derakhshani (2018) [21] Mobile device Face recognition Yes Yes Yes

Our survey Mobile IoT deviceAll Yes YesYes

ML and DM: machine learning (ML) and data mining (DM) algorithms