Continuous Behavioral Biometrics for Passwordless Authentication: A Trust Engine - Privacy Preserving, On Device Trust Engine for Mobile and Wearables
DOI:
https://doi.org/10.63282/3050-9246.IJETCSIT-V5I3P116Keywords:
Continuous Behavioral Biometrics, Passwordless Authentication, On-Device Trust Engine, Privacy-Preserving Security, Zero-Trust FrameworksAbstract
In current digital systems, passwords also constitute a significant source of weakness as they have been linked to more than eighty percent of data attacks throughout the world. Behavioral Biometrics, a type that examines behaviours like typing speed, single-hand motions, and footprints, provide continuous authentication, although most systems are centralized, presenting privacy concerns and lag. This paper introduces a privacy-sensitive on-device, trust engine of constantly authenticated behavior on mobile and wearable devices. The system converts real-time behavioral indicators, resulting in a dynamic trust score, allowing passwordless authentication and retaining all the raw data locally. Publication tests and practice logs in practice prove high accuracy with a True Acceptance Rate of over 90 percent, and with a False Acceptance Rate of under 5 percent and Equal Error Rate of about 6.5 percent. Latency is less than 50 milliseconds per assessment, and memory footprint is less than 50 MB. The solution identifies suspicious activity, promotes fallback with multiple factors, and is consistent with the principles of zero-trust. This framework would offer a feasible, secure, and privacy-aware metric of mobile, wearable, and IoT surroundings, sealing the insufficiencies of traditional biometrics as well as network-level trust frameworks.
Downloads
References
[1] Ubale A. Beyond Telematics: Leveraging Generative AI for Synthetic Accident Reconstruction and Liability Attribution in Autonomous Vehicle Claims. IJAIBDCMS [Internet]. 2023 Dec. 30 [cited 2026 Feb. 24];4(4):119-24. Available from: https://ijaibdcms.org/index.php/ijaibdcms/article/view/356
[2] Shahin, M., Babar, M. A., & Zhu, L. (2017). Continuous integration, delivery and deployment: A systematic review on approaches, tools, challenges and practices. IEEE Access, 5, 3909–3943. https://doi.org/10.1109/ACCESS.2017.2690565
[3] Lyu, L., Yu, H., Ma, X., Chen, C., Sun, L., Zhao, J., Yang, Q., & Philip, S. Y. (2020). Privacy and robustness in federated learning: Attacks and defenses. IEEE Transactions on Neural Networks and Learning Systems. https://arxiv.org/abs/2012.06337
[4] Veluru, S. P., & Manchala, M. K. (2021). Federated AI on Kubernetes: Orchestrating secure and scalable machine learning pipelines. Essex Journal of AI Ethics and Responsible Innovation.
[5] Bogo, M., Soldani, J., Neri, D., & Brogi, A. (2020). Component-aware orchestration of cloud-based enterprise applications: From TOSCA to Docker and Kubernetes. Future Generation Computer Systems, 108, 91–106. https://arxiv.org/abs/2002.01699
[6] Yusaf, T., Kadirgama, K., Hall, S., & Fernandes, L. (2022). The future of sustainable aviation fuels: Challenges and solutions. Energies, 15(21), 8151. https://doi.org/10.3390/en15218151
[7] Vanama, S. K. R. (2024). Architecture Led Cloud Modernization: A Framework for Enterprise Migration from VMware to OpenShift and AWS. International Journal of Emerging Research in Engineering and Technology, 5(1), 117-125. https://doi.org/10.63282/3050-922X.IJERET-V5I1P114
[8] Vanama, S. K. R. (2023). Integrating Site Reliability Engineering SRE Principles into Enterprise Architecture for Predictive Resilience. International Journal of Emerging Trends in Computer Science and Information Technology, 4(3), 164-170. https://doi.org/10.63282/3050-9246.IJETCSIT-V4I3P117
[9] Ubale A. From Detect and Repair to Predict and Prevent: Assessing the Viability of Real-Time AI Nudges in Reducing Fleet Accident Rates. IJERET [Internet]. 2024 Jun. 30 [cited 2026 Feb. 24];5(2):115-23. Available from: https://ijeret.org/index.php/ijeret/article/view/408
[10] Lydia, M., Prem Kumar, G. E., & Selvakumar, A. I. (2022). Securing the cyber-physical system: A review. Cyber-Physical Systems, 9(3), 193–223. https://doi.org/10.1080/23335777.2022.2104378
[11] Deochake, S., & Channapattan, V. (2022). Identity and access management framework for multi-tenant resources in hybrid cloud computing. arXiv preprint arXiv:2203.11463. https://arxiv.org/abs/2203.11463
[12] Bhattacharjee, A., Barve, Y., Gokhale, A., & Kuroda, T. (2019). CloudCAMP: Automating cloud services deployment and management. Proceedings of the IEEE International Conference on Cloud Computing. https://arxiv.org/abs/1904.02184
[13] Gomber, P., Koch, J.-A., & Siering, M. (2020). FinTech: Research directions to explore the digital transformation of financial service systems. Journal of Service Theory and Practice, 30(1), 79–102. https://doi.org/10.1108/JSTP-08-2018-0185
[14] Hermes, S., Riasanow, T., Clemons, E. K., Böhm, M., & Krcmar, H. (2020). The digital transformation of the healthcare industry: Exploring the rise of emerging platform ecosystems and their influence on the role of patients. Business Research, 13, 1033–1069. https://doi.org/10.1007/s40685-020-00125-x
[15] Pástor, Ľ., Stambaugh, R. F., & Taylor, L. A. (2019). Asset price effects of peer benchmarking: Evidence from a natural experiment. International Review of Economics & Finance, 62, 53–65. https://doi.org/10.1016/j.iref.2019.02.012
[16] Kamila, N. K., Frnda, J., Pani, S. K., Das, R., Islam, S. M. N., Bharti, P. K., & Muduli, K. (2022). Machine learning model design for high performance cloud computing and load balancing resiliency: An innovative approach. Journal of King Saud University – Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2022.10.001
[17] Patel, N. (2021). Power-aware simulation challenges and solutions in semiconductor ICs design verification. International Journal of Intelligent Systems and Applications in Engineering.
[18] Gay, G., Staats, M., Whalen, M., & Heimdahl, M. P. E. (2015). The risks of coverage-directed test case generation. IEEE Transactions on Software Engineering, 41(8), 803–819. https://doi.org/10.1109/TSE.2015.2421011
[19] Benton, R. A., & Keister, L. A. (2017). The lasting effect of intergenerational wealth transfers: Human capital, family formation, and wealth. Social Science Research, 68, 1–14. https://doi.org/10.1016/j.ssresearch.2017.09.006
[20] Beaulahsoundarabai, P., Thriveni, J., Venugopal, K. R., & Patnaik, L. M. (2013). An improved leader election algorithm for distributed systems. International Journal of Next-Generation Networks, 5(1), 21–34. https://doi.org/10.5121/ijngn.2013.5102
[21] Stier, C., Domaschka, J., Koziolek, A., Krach, S., Krzywda, J., & Reussner, R. (2018). Rapid testing of IaaS resource management algorithms via cloud middleware simulation. Future Generation Computer Systems. https://arxiv.org/abs/1801.09484
[22] U. Din, M. Guizani, B. S. Kim, S. Hassan, and M. K. Khan, "Trust management techniques for the Internet of Things: A survey," IEEE Access, vol. 7, pp. 29763–29787, 2018. https://ieeexplore.ieee.org/abstract/document/8531615
[23] Y. Alghofaili and M. A. Rassam, "A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique," Sensors, vol. 22, no. 2, p. 634, 2022. https://doi.org/10.3390/s22020634
[24] M. J. Khan, "Zero trust architecture: Redefining network security paradigms in the digital age," World Journal of Advanced Research and Reviews, vol. 19, no. 3, pp. 105–116, 2023. https://doi.org/10.30574/wjarr.2023.19.3.1785
[25] Y. Yang, H. Wang, R. Jiang, X. Guo, J. Cheng, and Y. Chen, "A review of IoT-enabled mobile healthcare: Technologies, challenges, and future trends," IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9478–9502, 2022. https://doi.org/10.1109/JIOT.2022.3144400
[26] N. Bouacida and P. Mohapatra, "Vulnerabilities in federated learning," IEEE Access, vol. 9, pp. 63229–63249, 2021. https://ieeexplore.ieee.org/abstract/document/9411833
[27] G. L. Santos, P. T. Endo, D. Sadok, and J. Kelner, "When 5G meets deep learning: A systematic review," Algorithms, vol. 13, no. 9, p. 208, 2020. https://doi.org/10.3390/a13090208
[28] V. T. Hayashi and W. V. Ruggiero, "Hands-free authentication for virtual assistants with trusted IoT device and machine learning," Sensors, vol. 22, no. 4, p. 1325, 2022. https://www.mdpi.com/1424-8220/22/4/1325
[29] M. A. Khan, I. U. Din, T. E. Majali, and B. S. Kim, "Survey of authentication in Internet of Things-enabled healthcare systems," Sensors, vol. 22, no. 23, p. 9089, 2022. https://www.mdpi.com/1424-8220/22/23/9089
[30] U. Ali, M. Y. I. B. Idris, J. Frnda, M. N. B. Ayub, M. A. Khan, N. Khan, and M. Babar, "Enhanced lightweight and secure certificateless authentication scheme (ELWA) for Internet of Things environment," Internet of Things, vol. 24, p. 100923, 2023. https://www.sciencedirect.com/science/article/pii/S2542660523002469
