Review Article
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
Table 1
Related surveys on biometric authentication.
| Reference | Deployment scope | Focus biometric area | Threat models | Countermeasures | ML and DM |
| Gafurov (2007) [8] | Not mobile | Gait recognition | No | No | No |
| Revett et al. (2008) [9] | Not mobile | Mouse dynamics | No | No | No |
| Yampolskiy and Govindaraju (2008) [10] | Not mobile | Behavioral-based | No | No | No |
| Shanmugapriya and Padmavathi (2009) [11] | Not mobile | Keystroke dynamics | No | No | Yes |
| Karnan et al. (2011) [12] | Not mobile | Keystroke dynamics | No | No | Yes |
| Banerjee and Woodard (2012) [13] | Not mobile | Keystroke dynamics | No | No | Yes |
| Teh et al. (2013) [14] | Not mobile | Keystroke dynamics | No | No | Yes |
| Bhatt et al. (2013) [15] | Not mobile | Keystroke dynamics | No | No | Yes |
| Meng et al. (2015) [16] | Mobile device | All | Yes | Yes | Partial |
| Teh et al. (2016) [17] | Mobile device | Touch dynamics | No | No | Yes |
| Mahfouz et al. (2017) [18] | Smartphone | behavioral-based | No | No | Yes |
| Mahadi et al. (2018) [19] | Not mobile | behavioral-based | No | No | Yes |
| Sundararajan and Woodard (2018) [20] | Not mobile | All | No | No | Yes |
| Rattani and Derakhshani (2018) [21] | Mobile device | Face recognition | Yes | Yes | Yes |
| Our survey | Mobile IoT device | All | Yes | Yes | Yes |
|
|
ML and DM: machine learning (ML) and data mining (DM) algorithms
|