Date of Award

12-2024

Document Type

Project

Degree Name

Master of Science in Cybersecurity and Analytics

Department

Information and Decision Sciences

First Reader/Committee Chair

Canelon, Jesus (Ph.D.) Shayo, Conrad (Ph.D.)

Abstract

With the constant evolution of technology specifically on mobile devices, keeping personal and sensitive information safe has become increasingly vital. Continuous user authentication marks a major step forward in mobile security because it provides ongoing verification of user identity beyond the initial log in. This research explores the significance of continuous user authentication systems across mobile devices through literature-based analysis. The following research questions are addressed: (Q1) How effective are continuous user authentication methods in mitigating mobile device threats? (Q2) What are the vulnerabilities associated with continuous user authentication systems on mobile devices? (Q3) How do different continuous user authentication methods impact the overall risk profile of mobile devices? The findings are: Q1. Continuous user authentication methods are highly effective in mitigating risks therefore reducing the risk of unauthorized access on mobile devices (Baig et al., 2023; Patel et al., 2016). Q2. Vulnerabilities associated with continuous user authentication systems include usability challenges, security challenges, privacy concerns, and ethical considerations (Ayeswarya & Singh, 2024). Q3. Different continuous user authentication systems impact the overall risk profile of mobile devices depending on the resilience of the attack (dos Santos et al., 2022; Baig et al., 2023). The conclusions are: Q1. Continuous user authentication methods are effective in improving mobile device security through continuously monitoring user identity. Q2. Although continuous user authentication enhances security there are several vulnerabilities related to usability, security, privacy, and ethical considerations. Q3. The impact on the overall risk profile is based on the continuous user authentication method being used. Areas for future research include: improving the robustness of continuous user authentication systems against adversarial attacks, enhancing privacy protection mechanisms, and exploring the integration of a multi-modal approach.

Share

COinS