International Journal of Emerging Technology and Advanced Engineering (IJETAE)
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in user takes a short break without logging out or an impostor coerces the valid user to allow access to the system. Thus to ensure authenticity of the user during their entire active login period, a continuous verification is required. The current paper considers continuous un-obstrusive biometric authentication as an approach to eliminate this problem. This paper discusses about the number of research works introduced to overcome the difficulties faced in continuous authentication.