About This Special Issue
The rapid developments in mobile devices and communication technologies have facilitated the spread of interconnected sensors, actuators and heterogeneous devices which collect and exchange a large amount of data to offer a new class of advanced characterized by being available anywhere at any time and for anyone. In the past years, smartphones have become an indispensable component in modern society. Many of these devices rely on personal identification numbers as a form of user authentication. One of the main concerns in the use of mobile devices is the possibility of a breach in security and privacy if the device seized by an outside party. Smartphone can be easily lost due to their small size, thereby exposing details of user's private lives. Users behavior authentication is designed to overcome this problem by utilizing user behavioral technique to continuously access user identity. Accordingly, research into the security and privacy of the behavioral data profiling technique that utilizes data collected from the user behavior application to verifying the identity of the user in continuous manner.
Aims and Scope:
- This special issue aims to present the most important new authentication technique
- Behavioral data profiling is designed in a modular manner
- Behavioral data profiling provides a significant improvement in the security
- Enable verification of the user's identity through their applications usage
- Security of smartphones
- Decision making process