User Authentication Schemes Using Machine Learning Methods—A Review

Nyle Siddiqui,Laura Pryor,Rushit Dave
DOI: https://doi.org/10.1007/978-981-16-3246-4_54
2021-01-01
Abstract:With the recent advancements in technology, more and more people rely on their personal devices to store their sensitive information. Concurrently, the environment in which these devices are connected have grown to become more dynamic and complex. This opens the discussion of if the current authentication methods being used in these devices are reliable enough to keep these user’s information safe. This paper examines the different user authentication schemes proposed to increase the security of different devices. This article is split into two different avenues discussing authentication schemes that use either behavioral biometrics or physical layer authentication. This survey will discuss both the advantages and challenges that arise with the accuracy, usability, and overall security of machine learning methods in these authentication systems. This article aims to improve further research in this field by exhibiting the various current authentication models, their schematics, and their results.
What problem does this paper attempt to address?