Introduction

Authentication is a necessary security service to prevent false data injection and is also required to verify a user’s identity before data access [1,2,3,4,5,6,7,8,9,10,11,12,13]. Authentication, security, user’s privacy protection and data confidentiality are important for patient or doctor accessing to remote health monitoring system (RHMS) and Electronic Medical Records (EMR) [14, 15]. RHMS needs secure authentication when using health applications [16,16,17,18,19,20,21,23]. A secure authentication scheme will be required to achieve these goals [24,24,25,26,27,29].

Telemedicine is an emerging technology that largely benefits patient healthcare areas. It is a medical application of information technology that enables patients to have medical consultations outside hospitals by using video conferencing or digital imaging systems [30, 31]. Telemedicine is a remote medical practice that allows coordination amongst different individuals and facilitates their collaboration efforts in diagnosing or treating a disease through information technologies and telecommunication [32,32,34]. Thus, this domain requires multidisciplinary advancements, particularly in the use of telecommunication, computer science and instrumentation, for the exchange and administration of medical data [35, 36]. Currently, telemedicine has attracted considerable attention in research due to the development of new technologies [32, 37] and has appeared many tools to support it [38,37,38,41]. Telemedicine is a proficient tool that allows coordinated efforts amongst doctors and offers numerous benefits, such as enhanced care, cost investment funds, improved arrival and real-time responses. Similar to medicinal training, telemedicine is used for diagnosis; the conduct of preventive or post-curative medicinal checking and monitoring and therapeutic procedures; and the prescription of medications and provision of services [32]. Authors in [42, 43] reported that a general three-tier pervasive telemedicine system based on a wireless body area network (WBAN) enables real-time and continuous healthcare monitoring. In Tier 1, users can obtain their vital signals through small intelligent wireless sensors and send them to Tier 2, which is the personal gateway (e.g. smartphones), through small-area network protocols (e.g. Bluetooth and Zigbee) and the WBAN. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes (MIs), through wide-area wireless communication protocols or Internet services. Healthcare providers in Tier 3 apply certain processes and generate services that are sent back to users as responses. Tiers 1 and 2 represent the client side, which can serve patients through mobile health (mHealth), whereas Tier 3 represents the server side. This process is shown in Fig. 1 [35].

Fig. 1
figure 1

Three-tiered architecture of a WBAN telemedicine system for healthcare monitoring

With the recent progress of electronics and information technology, telemedicine is currently not only a technology that facilitates remote medical conversations but also utilises various biomedical sensors to capture several critical vital signs [44,43,46]. Vital signs of patients must be sent to doctors in securely through the Internet (e.g. using IPSec [47,46,47,50]). Unfortunately, despite these benefits, telemedicine still suffers from several problems associated with security issues [47,46,49, 51,50,51,52,55]. Patients have long been plagued by problems, such as security and privacy on authentication for sensor-based mHealth [56,55,56,59], there are many techniques can be used to face the security issues related m-health [60,59,60,61,62,63,64,65,66,67,68,69,72]. As well as, the sensor-based defence and attack mechanisms can be easily improved to ensure the privacy of patients in the client side when using a smartphone. When using health applications, patients also need access to mHealth via secure authentication to ensure secure transmission of their vital signs/data [47,46,49, 73,72,73,74,75,76,77,80]. In this context, factors on smartphones are considered to understand fully the various contextual aspects of the field in published studies. The characteristics include the motivation and challenges faced by researchers and the recommendations to strengthen this critical area of research to adopt within mHealth fully. This study aims to analyse and review the literature on sensor-based smartphones. Exploring the literature reveals numerous research articles on authentication for sensor-based smartphones. Many methods and technologies have been previously developed for accessing smartphones, user recognition and data security [81,80,81,82,83,84,85,86,87,88,91]. In this study, the use of smartphone sensors, particularly orientation (e.g. accelerometer, gyroscope and magnetic sensors), finger, camera and touchscreen sensors, is discussed. The main focus of this discussion is on usability and security [92]. Authentication solutions based on biometrics are a promising technique to replace traditional authentication mechanisms [93, 94]; such traditional techniques rely on personal identification numbers (PINs) or passwords, which are often perceived as inconvenient by patients [95,94,95,96,97,98,99,100,101,102,103,106]. Biometrics is more reliable and capable of distinguishing between the authorised user and a fraud than the traditional means of identity verification, which merely confirms the knowledge of users. The biometric approach has two types, namely, behavioural and physiological. The biometric approach can effectively prevent access to unauthorised mobile resources and avoid identity theft [81,80,81,82,83,84,85,86,87,88,91, 95, 107,106,107,110]. Ling (2016) stated that oily or thermal residues remain on the touchscreen, thereby leaving a visible effect that can be detected by the naked eye; thus, the movement of the finger on the screen can be analysed as the starting point of the attack depending on the motion sensor [111]. The use of sensors is varied, and new methods to protect smartphones have been developed. User recognition methods do not require identification through fingertip [112], gesture [108, 113, 114] or gait [115, 116] of users. Some studies are based on the behaviour of patients; therefore, the authentication process has been divided into the following four sections: continuous authentication (CA) [117, 118], implicit authentication (IA) [119, 120], mechanism authentication [121, 122] and hybrid tracking [120]. Researchers have developed methods to obtain the latest impenetrable and easy-to-use sensor to improve the defence and attack mechanisms of sensor-based mHealth [123,122,125]. Rybnicek (2014) found that no databases are available because user samples contain stored data from accelerometer, gyroscope, touchscreen, keyboard and magnetic terrestrial sensors. Therefore, researchers are required to acquire data prior to exploring a new authentication technique [126]. Nevertheless, many researchers have used ready-made datasets [127]. This systematic review of the present study comprises two layers of review; the first layer aims to survey the academic literature related to the security and privacy of sensor-based telemedicine applications, whereas the second layer aims to survey the relevant studies on security and privacy of sensor-based smartphone authentication. Figure 2 shows a framework of multilayer systematic review protocols. The remainder of this paper is organised as follows. Sections 2 and 3 provide an overview of the first and second layers of our systematic review protocol, respectively. Section 4 illustrates the challenges, motivations, recommendations and methodological aspects indicated in the literature review, which is collected from diverse studies on security and privacy of sensor-based smartphone authentication. Finally, conclusions are drawn in Section 5.

Fig. 2
figure 2

Framework of multilayer systematic review protocols

First Layer: systematic review for security and privacy of sensor-based telemedicine applications

Method

Telemedicine applications are widely presented in the academic literature and have recently acquired considerable popularity [128]. The keywords used in the first layer of this study were ‘telemedicine’, ‘sensor’, ‘triage’ and ‘priority’. Only English-language literature is surveyed in this layer. Therefore, all telemedicine-related areas, including the general category of health domains, were considered. The following three digital databases [129, 130] were used to conduct the search for target articles:

  1. 1.

    ScienceDirect database, which offers access to science and technical journal articles;

  2. 2.

    IEEE Xplore library of technical literature in engineering and technology; and

  3. 3.

    Web of Science (WoS) service, an indexing database that covers different academic disciplines.

The sources of this layer were carefully screened from the literature sources. The study period of this layer was 10 years, from 2007 to 2017. The study selection of this layer comprised searching the academic literature sources and was classified based on two stages. In the first stage, filtering and screening were accomplished to exclude duplicates and unrelated studies to the remote health monitoring systems based on sensor information [131,130,133]. In the second stage, the authors executed filtering on the basis of the security and privacy of telemedicine applications for articles collected from the first stage. Consequently, the final encompassed set was correlated to the security and privacy of sensor-based telemedicine applications through diverse topics, as shown in Fig. 3. The search was conducted on April 2017 via the search boxes of the ScienceDirect, WoS and IEEE Xplore databases. We used a combination of groups of keywords. The first group included ‘medical system’, ‘telemonitoring’, ‘e-health’, ‘telemedicine’, ‘telehealth’, ‘healthcare services’, ‘mHealth’, ‘remote monitoring’ and ‘mobile doctor’; these keywords were combined by the ‘OR’ operator. The second group included ‘triage’ and ‘priority’, which were combined by the ‘OR’ operator. The third group included only one keyword, that is, ‘sensor’. The three groups were combined by the ‘AND’ operator. Figure 3 shows the query. The options provided by each database were considered. Books, reports and contents that appeared in the search results were excluded. However, the latest journal articles and conferences were adopted, and the most relevant were considered for this layer of our study [128, 134,133,136]. The criteria described in Fig. 3 were followed and applied to each article. Every article that satisfied the criteria listed in Fig. 3 was included. A plan was devised to cover the research using two categories related to the privacy and security of telemedicine literature. Duplicates were initially removed, and the articles that did not satisfy the criteria of eligibility within the stages of screening and filtering were then excluded. All involved criteria used in this layer in the two stages of our filtering are listed in Fig. 3.

Fig. 3
figure 3

First-layer flowchart of study selection, including search query and inclusion criteria

Results

In this layer, the first result from the query search showed n = 3064 articles published in 2007–2017; particularly, 657, 911 and 1496 articles were from WoS, Science Direct and IEEE Xplore, respectively. A total of 1612 out of 3064 studies published from 2012 to 2017 were collected in the first stage of filtering. Then, the collected studies (n = 65/1612) of duplicated articles were found in the three libraries. This stage also excluded n = 1264/1547 of the articles after filtering the titles and abstracts, and 283 articles were obtained. Reading the entire text resulted in the exclusion of n = 133/283 of the articles, thereby obtaining 150 articles. In the second stage of filtering, the articles were filtered and those obtained from the previous stage according to the security and privacy of telemedicine applications resulted in the exclusion of n = 131/150 of the articles after filtering the full text. Only 19 articles related to the security and privacy of telemedicine applications were obtained. Then, resulting articles from this layer were carefully read and divided into two major categories to present a general research map of the security and privacy of telemedicine applications. Amongst the 19 articles, 57.89% (n = 11/19) indicated the review articles, which aim to examine telemedicine articles and their applications to present the current direction to researchers and identify the need for future research direction on unknown telemedicine topics. A total of 42.1% (n = 8/19) articles involving three tiers (Tiers 1–3) contributed to security and privacy within the telemedicine architecture. Tiers 1 and 2 represented the client side, which comprised medical sensors (i.e. ECG, BP and SpO2) connected with mHealth (i.e. smartphones and taps) that facilitate the transfer of vital signs of patients to the medical centre side (Tier 3). The articles in this category were classified into three subsections as follows: (1) Tier 1 (n = 5/8 articles), Tier 2 (n = 1/8 articles) and Tier 3 (n = 2/8 articles). This systematic review classified all related articles within the mentioned category into a literature taxonomy, as shown in Fig. 4.

Fig. 4
figure 4

First-layer taxonomy of research literature on the security and privacy of telemedicine applications

Review

The primary goal of survey and review articles on telemedicine is to understand current thinking and justify the need for future research on related topics that have been overlooked or understudied. This category contained 11 articles. A review of the penetration of mobile technology in Asia considered the integration with diagnoses and treatments of mental disorders and highlighted the limitations and potential barriers of mHealth for mental health, including data security and privacy, language and literacy barriers and power supply issues [137]. The study in [35] focused on the field of patient telemonitoring conducted in European projects to present the requirements and components common of telemonitoring system in the context of technical issues, services, tools and functionalities and distinguish projects related to comfort and security. A comprehensive survey of mHealth research initiatives in Brazil included 42 projects. This analysis considered issues, such as health condition, security features, development and deployment of involved main providers, types of devices used and target users, where each project was tested and/or deployed amongst others [138]. The study in [43] reviewed WBAN applications and highlighted their QoS requirements. The goal was to provide appropriate wireless technologies for WBAN by studying various technologies and attempting to associate the WBAN applications with the suitable technologies for maximum QoS. The study in [139] explored the effective measures and strategies for the promotion of ICT-enabled innovations for people with special needs and the elderly. The study reviewed and evaluated the current government initiatives in the field of e-health and accessibility, which address the challenges faced by the rapidly ageing society of Japan. A review of mHealth technologies for military mental health was presented in [140] to identify two categories of high-priority mHealth technology development considerations, namely, priority considerations to mental health care provision and broad applicability to mHealth. This review also included military programmes, such as the Telemedicine and Advanced Technology Research Center, the Military Operational Medicine Research Program, United States Army Medical Research and Material Command and the National Center for Telehealth and Technology. A review in the study of [141] provided an overview on the state of mHealth in a wide array of biomarkers in the context of psychiatric functioning (e.g. anxiety, substance use, autism and psychological stress); this study also identified several specific opportunities for expanding this promising methodology and advantages and special considerations for incorporating mHealth tools. A comprehensive review of the state of the art on mHealth applications and services was presented in [142]. This review surveyed the most important studies and presented a comprehensive analysis of the top and novel applications and services in the industry considering the approaches of the United States and European Union. A study on national domain and quality was conducted and provided an overview of the US population health, access to care, status of healthcare quality and disparities in care experienced by different socioeconomic, racial and ethnic groups [143]. The author in [144] reviewed different technologies and technological advances applicable to oncology care through websites, books, magazine articles, online product-specific information and peer-reviewed guidelines and studies. The authors in [145] provided a systematic review for health smart homes and home-based consumer health literature from indexed repositories for healthcare and technology disciplines and categorized the included articles according to an evidence-based public health typology.

Telemedicine architecture

This category contained eight articles within three subsections of Tiers 1–3) as explained as follows.

Tier 3

A healthcare provider in MIs generally allows medical professionals to monitor and analyse vital signs in real time and provide patients with appropriate healthcare services. It can also manage, organise and support professionals in telemedicine. Generally, a healthcare provider comprises a medical institution’s server, patient history and database and service generation [146]. This subsection contains two articles. An innovative architecture for collecting and accessing large amount of data generated by medical sensor networks was proposed in [147]. This architecture overcomes all the aforementioned challenges and facilitates easy information sharing between healthcare professionals in normal and emergency situations. Furthermore, this study proposed an effective and flexible security mechanism that guarantees confidentiality, integrity and fine-grained access control to outsourced medical data. This mechanism relies on Ciphertext-Policy Attribute-based Encryption to achieve high flexibility and performance. A machine-to-machine low-cost and secure communication system for e-Healthcare society was proposed in [148]. The system was designed to consider the psychological issues related to all actors in the e-Healthcare society, such as stress, anxiety and loneliness. To ensure data privacy, this mechanism involves intelligent authentication based on random distributive key management, electronic certificate distribution and modified Kerberos realm.

Tier 2

In Tier 1, patients can acquire their vital signs and send them to Tier 2 through small-area network protocols (e.g. Zigbee and Bluetooth) and WBAN [149]. The Tier 2 in telemedicine architecture is used to bridge sensor-based vital signs to remote stations by using interfaces, such as LAN, 3G, 4G or u-health [150]. This subsection contains only one article. A priority-based health data aggregation (PHDA) scheme was proposed in [151] with privacy preservation for cloud-assisted WBANs to improve the aggregation efficiency amongst various types of health data. The study explored social spots to aid forward health data and enable patients to select the optimal relay according to their social ties. The security analysis in this study demonstrated that the PHDA could achieve identity and data privacy preservation while resisting forgery attacks.

Tier 1

The first tier in telemedicine architecture is represented by Tier 1, which comprises tiny intelligent wireless sensors responsible for gathering the vital signs of patients and transmitting vital information to Tier 2 through WBANs [152]. This subsection contained five articles. The authors in [153] implemented TinyECC, which is a public key algorithm with optimisations for resource-constrained hardware platforms, to secure the wireless communication between sensor nodes and investigate the feasibility of using TinyECC in a real-time sensor network. A system for secure logging of events in sensor networks was introduced in [154] by gathering all information at one central point in a secure and reliable manner. The system guarantees the chronological order of logged events sent by the different sensors. It also permits one to detect the modification, deletion and addition of logged data and design a prototype of the gateway sensor on an FPGA platform. In [155], a security protocol for ultra-wideband impulse radios was proposed based on distance bounding; this protocol provides multiple levels of security, including encryption and a distance bounding test, to prevent long-distance attacks used in WBANs for medical devices where security is imperative. The authors in [156] proposed a priority-based compressed data aggregation scheme with integrity preservation to improve the aggregation efficiency of different types of health data in medical wireless sensor networks. This study used compressed sensing to reduce the communication overhead and minimise power consumption. Then, the compressed data were encrypted, and integrity was protected by a cryptographic hash algorithm to preserve data integrity. A comparative performance analysis between the IEEE 802.15.6-based communication system using UP and the IEEE 802.15.4-based communication system was conducted in [157] to show the effectiveness of the IEEE 802.15.6 in home monitoring of an individual cardiac patient in WBANs.

Critical review and analysis

Overall, the aforementioned studies within Tiers 1 and 2 (client side) have not presented solutions for the security and privacy of sensor-based mHealth related with authentication issues. Thus, adding another layer to review the security and privacy of sensor-based smartphone authentication to gain the bifacial of these studies and fully adopt them within the client side in telemedicine environment is necessary. The new mapping of a multilayer systematic review allows interring additional knowledge of sensor-based smartphone authentication within the second-layer studies, which include a wide area of authentication contributions. This study aims to highlight completed research, such as the aforementioned articles that were conducted to address new and authentication technologies, delineate research scene from the literature to a coherent taxonomy and discover the key aspects that describe this developing research direction, which will be proposed and described in detail.

Second Layer: systematic review for security and privacy of sensor-based smartphone authentication

In this layer, sensor-based authentication techniques are newly introduced in the academic literature. The keyword used in this layer is ‘sensor-based mobile’, which excludes any other type of non-smartphone devices. The English-language literature is a limitation of this scope. Therefore, all authentication-related areas, including the general category of password and sensor types, were considered. In addition, colour and colour gradients were used as keywords to secure information related to sensor-based mobile phones. The following three digital databases were used to conduct the search for target articles:

  1. 1.

    ScienceDirect database, which offers access to science and technical journal articles;

  2. 2.

    IEEE Xplore library of technical literature in engineering and technology;

  3. 3.

    WoS service, an indexing database that covers different academic disciplines; and

  4. 4.

    SciVerse Scopus, an indexing database that covers different academic disciplines.

The sources of this layer were carefully screened from the literature sources. The study period was 10 years, from 2007 to 2017. The articles were screened and filtered to exclude duplicates and those unrelated to this layer. Then, full-text reading was performed. The search was conducted on August 2017 via the search boxes of the ScienceDirect and IEEE Xplore databases.

We used a combination of groups of keywords. The first group included ‘sensor-based mobile’, ‘accelerometer’, ‘gyroscope’, ‘magnetometer’, ‘proximity sensor’, ‘light sensor’, ‘barometer’, ‘thermometer’, ‘air humidity sensor’, ‘pedometer’, ‘heart rate monitor’ and ‘fingerprint sensors’; these keywords were combined by the ‘OR’ operator. The second group included ‘password’, ‘lock pattern’, ‘PIN code’, ‘full-blown password’, ‘fingerprint’, ‘facial recognition’ and ‘authentication’; these keywords were combined by the ‘OR’ operator. The third group included ‘mobile’, ‘smartphone’, ‘hand phone’, ‘smart phone’ and ‘handphone’; these keywords were combined by the ‘OR’ operator. The three groups were combined by the ‘AND’ operator. Figure 5 shows the query. The options provided by each database were considered. Books, reports and contents that appeared in the search results were excluded [158]. However, the latest journal articles and conferences were adopted, and the most relevant were considered for our study. The criteria described in Fig. 5 were followed and applied to each article. Every article that satisfied the criteria listed in Fig. 5 was included. A plan was devised to cover the research in four categories to protect the privacy of smartphones that operate on sensors. Google Scholar was used to obtain the views and trends in the literature entitled ‘ACCessory: Password Inference using Accelerometers on Smartphones’. Duplicates were initially removed, and the articles that did not satisfy the criteria of eligibility within the stages of screening and filtering were then excluded. The exclusion criteria included non-English articles and articles that focused on a specific aspect of smartphones that do not use any type of sensor in authorisation. All included articles from different sources were used to further improve our investigation. A few full-content readings led to a substantial gathering of features and remarks on these works and resulted in a refined scientific categorisation of articles. All remarks were excluded from the text (contingent upon each writer’s favoured style, either in hard or delicate duplicate renditions). The principal discoveries were compressed, organised and presented. The sets of relevant information (including a full list of articles, their respective source databases, summary and description tables, categorisation tables, purposes, review sources, target platforms, audience and various related figures) were saved in Word and Excel formats. These datasets are shown in the Supplementary Material section. Figure 6 presents the number of articles according to index source and type in the second layer.

Fig. 5
figure 5

Second-layer flowchart of study selection, including search query and inclusion criteria

Fig. 6
figure 6

Number of articles according to index source and type in the second layer

Result

The first result from the query search showed n = 637 articles published in 2007–2017; particularly, 228, 75, 16 and 318 articles were from Science Direct, IEEE Xplore, WoS and Scopus. A total of 5.96% (n = 38/637) of duplicated articles were found in the four libraries. In the second set of results, 80.96% (n = 485/599) of the articles were excluded after filtering the titles and abstracts, obtaining only 19.03% (n = 114/599) of the articles. Reading the entire text resulted in the exclusion of 28.94% (n = 33/114) of the articles, and only 71.05% (n = 81/114) articles were obtained. Then, the articles were carefully read in the final set of a general research map conducted on this subject. The number of articles is shown according to index source and article type. Most of the selected articles (27) were from the United States, whereas the other articles were from 18 different countries, as shown in Fig. 8. Our analysis results show the three main research categories, namely, defence, attack and others. The ‘defence’ group included research articles that focus on defending smartphones from attackers, whereas the ‘attack’ group included those that utilise smartphone sensors to attack the phone. The ‘others’ group included articles that discuss the development of defence. However, the type of sensors used in the development is unclear.

Amongst the 81 articles, 86.41% (n = 70/81) represents the defence area, where sensor-based smartphones were used via an orientation sensor to authenticate the user; this authentication technique is called behaviour or gait authentication, as shown in Figs. 7 and 8. A total of 7.40% (n = 6/81) articles were attack articles, which were not intensively included in our literature analysis. The category ‘others’ was represented by 8.64% (n = 7/81) of the articles. Figure 9 presents the literature taxonomy.

Fig. 7
figure 7

(a) Sensors, (b) axes, (c) position of phone during gait recognition and (d) gait cycle [116, 118, 123]

Fig. 8
figure 8

Total number of articles according to country in the second layer

Fig. 9
figure 9

Second-layer taxonomy of research literature on sensor-based smartphone authentication

Figure 10 shows the relationship between the years of publication and the number of articles obtained during our study. The chart of the studies and the preparation within our research area are contrasting and thus should be explained. The observations related to this objective should be considered and expounded.

Fig. 10
figure 10

Number of included articles in different categories by year of publication in the second layer

The IEEE, Science Direct, WoS and Scopus search engines were targeted because they were the most reliable sources. The second layer is based on 81 articles from the following sources: IEEE (9 articles), WoS (3 articles), Science Direct (2 articles) and Scopus (56 articles). Many studies, which include all the documentation related to the sensors in the smartphone, were provided through these sources by international journals to aid users maintain safe and convenient devices.

Defence

We found the articles on smartphone protection by authentication using the sensors in those devices. The largest component includes using the orientation sensor, which comprises many sensors, such as the accelerometer and gyroscope. The other component is the fingerprint sensor, in which related articles suggest using a fingerprint to obtain smartphone authorisation. The third set of articles discusses the use of a touchscreen sensor. These articles indicate the pattern for obtaining authentication when using a password to access mobile data. The last set of articles in the defence group presents the camera sensor.

The articles were divided into four groups according to the type of sensor used. The orientation sensor accounts for the largest number of articles. A total of 35.71% (n = 25/70) articles on the orientation sensor developed based on gait authentication were obtained and divided into the following research strategies: cryptosystem with a fuzzy scheme that used cryptography and fuzzy logic to produce authentication for users. This strategy utilises human walking style, which is used as an authentication pattern to recognise whether the person is the authorised user. In this case, the developers use accelerometer data in the classification and/or recognition process.

The defence group was further classified into fingerprint sensor content with 5.71% (n = 4/70) of the articles [125], [159,158,161]. The touchscreen sensor has 5.71% (n = 4/70) articles. Half of these articles [50% (n = 2/4)] use hybrid authentication [162, 163], whereas the other half [50% (n = 2/4)] use CA [164, 165]. CA contains two articles; the first article uses touch gestures and virtual key typing. In addition, the defence group has 2.85% (n = 2/70) of the articles with two different methods, namely, ear and fingertip recognition authentication.

Orientation Sensor

The largest number of articles is about the use of orientation sensor, which includes many sensors, such as the accelerometer and gyroscope. In this category, 50% (n = 35/70) of the articles account for behaviour authentication, and the sensor-based gait authentication accounts for 35.71% (n = 25/70) of the articles. The details of each category are presented as follows.

Behaviour Authentication

Behavioural biometrics is defined by the measure of distinctive and commensurable patterns of human actions. The term appears differently in relation to physical biometrics, which includes intrinsic human qualities, such as patterns of fingers or iris. Biometric confirmation techniques of behaviour include pressure dynamics, analysis of gait and signature, voice ID, mouse use features and cognitive biometrics. Biometrics is used for safe authentication in government facilities, corporations, financial institutions, retail points of sale and in many other environments.

The articles in the behaviour authentication group were divided into the following four parts: CA with 77.14% (n = 27/35) of the articles, IA with 5.71% (n = 2/35) of the articles, mechanism authentication with 14.28% (n = 5/35) of the articles and hybrid tracking and trust zone with 2.85% (n = 1/35) of the articles. Some studies focus on hand gestures for signature [108]. Figure 11 presents the behavioural authentication [113, 167], gait recognition of CA [115, 116] and behavioural biometrics [167].

Fig. 11
figure 11

Using a magnet to perform 3D magnetic signature on the space around a device [166]

Sensor-Based Gait Authentication

Biometric authentication depends on a person’s gait, which represents the person’s motion when using a smartphone with accelerometer sensor to determine the authentication of this device. The sensor-based gait authentication includes 35.71% (n = 25/70) of the articles under the defence group; it was divided into cryptosystem and fuzzy commitment scheme with 4% (n = 1/25) of the articles, gait-pattern-based authentication with 92% (n = 23/25) and accelerometer data classification with 4% (n = 1/25) [168].

Fingerprint Sensor

In this article category, the defence group accounts for 5.71% (n = 4/70) of the articles. Some articles focused on hazard-based verification systems in setting mobile phones. These systems failed to provide solid gadget-related data that could be utilised for the hazard examination process [125]. Another article proposed the use of finger gestures as a characteristic in a range of unique fingerprint sensors, which was limited, conservative and cost-effective; the effectiveness of a specialised feature set was analysed [159, 160]. Any threat that could occur was determined while identifying the necessary steps to address security vulnerability [161].

Touchscreen Sensor

In this article category, the defence group accounts for 5.71% (n = 4/70) of the articles. The touchscreen sensor uses the touchscreen to obtain data for the authentication process, which was divided into two types, that is, CA with 50% (n = 2/4) of the articles and hybrid authentication with 50% (n = 2/4). The CA contents have two types, namely, touch gestures and virtual key typing. Some articles proposed the use of typing authentication and protection, which is a virtual key writing-based verification framework for mobile phones [165]. The proposed system considers miniaturised scale developments of a phone and that of the client’s finger whilst signing or writing on the touchscreen [164]. Another article on hybrid authentication system included CA and IA based on touch gestures [162].

Camera Sensor

In this article category, the defence group represents 2.85% (n = 2/70) of the articles. The camera sensor utilises the camera to obtain information with a specific goal for the verification procedure, which was divided into two types, that is, ear recognition authentication with 50% (n = 1/2) of the articles and fingertip recognition with 50% (n = 1/2). Some articles showed a picture of the ear using surface and shape data, which considered ear recognition [169]. Another article utilised a mobile phone’s camera to detect the fingertip development, move the cursor on the screen and execute clicks by detecting click movements [111].

Attack

Articles regarding attack on a smartphone were obtained by using sensors or gaps in these devices. This category accounts for 4.93% (n = 4/81) of the articles. In these articles, display TapLock was used as a mobile phone secret key framework that enables finger tapping on capacitive touchscreens for expansion whilst sustaining surfing assaults (the secret key contribution via a user can be effectively identified through an observer over the user’s shoulder) [170]. An attack has other genuine ramifications. The touchscreen is not the only primary keystroke input gadget but is the principal input gadget for most client cooperation (a reasonable special case includes sound-perceiving applications), which can supplant the console and mouse [171]. The experimental results from user authentication utilised touch operational features, and some features were extracted from an accelerometer [172].

Others

This category accounts for 8.64% (n = 7/81) of the articles, which were beyond the scope or were not included in the previous categories, such as articles that only reviewed sensors.

Discussion

This study aims to update the substructure of smartphone sensors constantly on the basis of authentication techniques, as well as the focus of the research trends. The results of the applications during the comprehensive survey are ignored, and the authentication techniques are considered. In addition, we provide the taxonomy of the articles on this topic. The development of the taxonomy based on the literature can provide several benefits. The taxonomy of published works imposes organisation on a set of publications. Numerous publications on the topic may be dominated by a new researcher who is interested in the trend of authentication with the absence of an organisational structure and fails to gain an appropriate sense of the actual activities in this field.

Various articles consider the topic from an introductory perspective, whereas other articles examine a selected number of existing applications and some actual applications involved in the development. Taxonomy is provided to sort out the various activities and works into a meaningful, coherent and manageable framework that is collected from the literature. The taxonomy can also provide researchers with novel ideas on several aspects of the topic.

Motivations

Authentication used in smartphones is a promising research area. This section presents some of the characteristics of the literature, which we have grouped into categories according to specific benefits based on references for further discussion, as shown in Fig. 12.

Fig. 12
figure 12

Benefit categories for smartphone authentication based on sensor

Benefits related to usability of smartphones

Smartphones are in our work and home environments ubiquitously. Individuals generally store their delicate and private data on their phones. Thus, verifying the legitimate users of a phone and blocking impostors are crucial [173, 174]. Omnipresent mobile devices, such as smartphones and tablets, are frequently vulnerable to unauthorised access because users do not utilise passwords due to inconvenience [116, 175]. Mobile devices, such as smartphones, tablets and portable computers, have rapidly spread over the last decade. Given that smartphones store a large amount of important private information, user authentication is increasingly necessary to prevent attacks, such as motion-based inference attack, by illegal users [171, 172, 176, 177]. A mobile device is a dominant model that becomes interactive between a human and a computer.

The theory of around-device interaction (ADI) in the field of human–computer interaction has recently gained attention. ADI covers beyond the peripheral area of a device and suggests a touchless user interface as an alternative to the classic data-entry methods [178]. Approximately more than five billion devices were used worldwide in 2015 [179]. Many people use smartphones to access their bank accounts and social networks and store their personal information. These devices, particularly their authentication mechanisms, may not be sufficiently safe [180]. The improvement of smartphones continually advances, and new features are rapidly included in the device. These features include high-quality cameras, UMTS antennas and calendars, thereby simultaneously increasing the number of applications that can be executed on a smartphone and the stored amount of sensitive data [127]. The use of these devices has increased over the past years as evidenced by the growth in their sales. Currently, many services use these devices to access social networks and bank accounts and store personal information [127]. Mobile devices constantly enter the lives of people; everyone possesses one or more smartphones (e.g. iPhone, Android and tablet). Identity verification is required in many common activities, and most people want to be authenticated in the easiest and most transparent manner, without the need to remember a PIN [119, 181]. Mobile devices currently contain an assortment of personal or business-related information that is secured from unauthorised access. Smartphones are increasingly utilised similar to PC platforms to access personal information; thus, the request for secure and usable authentication techniques for continuous protection is emphasised [177]. The owners of such devices ought to utilise an unlock pattern or passcode to secure such important resources. However, given that these procedures are considered disturbing obstructions, locked devices are not standard [126].

Mobile devices are considered fundamental devices in our daily lives [182]. Smartphones are context-aware devices that supply a convincing platform for omnipresent computing and support users in fulfilling many of their routine tasks anytime and anywhere, such as receiving and sending emails. The nature of tasks relative to these devices has developed with an exponential increment in the sensing and computing smartphone capabilities [183]. Smartphones have become a part of modern life. Currently, approximately 46% of the adult population in the US have smartphones. Although no accurate statistics is available on blind or disabled individuals as smartphone users, the assumption that the number increases is reasonable. This technological revolution has attracted thousands of disabled users, including the visually impaired [184]. Mobile devices have become popular and support people in their daily activities. Smartphones are available in the market as a wide range of portable and wearable devices [185].

People can go anywhere at any time with their smartphones. The important features of mobile devices include their diversity in sizes, styles and input controls (i.e. displays) and capability to store a substantial volume of data, including sensitive personal information, such as bank accounts or emails [185]. Personal and sensitive data, such as project information, emails and business contacts, are often included in a smartphone business scenario. However, in a private environment, the amount of sensitive data is high. In a special environment, the sensitive data stored on smartphone devices are of high quantity; thus, the protection of those data becomes increasingly important [186]. Mobile devices that use the Android operating system are used as a platform for the WISDM project, which is simple, open and free. Thus, this operating system is expected to dominate the smartphone market [187]. These devices offer innovative interaction models due to their low price and simplicity of use [179]. The adoption of smartphones rapidly increases yearly worldwide. The smartphone sales in the first quarter of 2013 reached 225 million, surpassing all previous sales figures. Moreover, the number of smartphones sold exceeded one billion units in 2014. In addition to this sales increase, the number of services (i.e. personal and corporate) available from these devices also increase [127].

Benefits related to security impact on smartphones

Mobile phones have received extensive research attention; numerous attack vectors and countermeasure solutions have also been explored [171]. Feng (2014) stated that an increasing amount of sensitive information, such as transaction information for bank accounts, credit cards and trade secrets, passes through mobile digital devices. He also identified new privacy and security issues. In January 2012, 32 million data breaches were reported, of which 40% were caused by hackers [120]. In response to these astonishingly large numbers, sensitive information should be processed through an approach that is independent of a potentially infected operating system whilst monitoring physical events of the device to detect possible physical unauthorised use. Previous mobile user authentication technologies, such as passwords, only offer protections at the login point [120]. The widespread use of small mobile computing devices, such as smartphones, increases the need to protect these devices and the sensitive data they contain against unauthorised use [95, 188, 189]. New features and functionalities in smartphones have led to an increased need to raise the safety level of these devices [165, 182]. The world of smartphones has rapidly grown; consequently, the demand for Internet access, applications and services has shown a remarkable increase. Therefore, smartphones are exposed to many threats, which include the thief’s ability to authenticate due to the easy identification of the PIN or password to access personal data [119, 164, 175]. In addition to privacy issues related to stolen or counterfeit biometrics, the burden of remembering passwords has led to a future idea of authentication systems. An attacker may be an unfamiliar person who steals or finds a mobile device. However, a family member, colleague or close friend may also be the attacker [171, 190]. New systems are expected to be transparent, and minimum user participation requires IA [112, 164, 169, 191, 192]. Biometrics is used in the authentication of smartphones to unlock the device at the start up, resulting in portable devices with only login authentication that are vulnerable to data theft [118, 183]. Display lock and release are the main features of modern phones to prevent unexpected operations and ensure security of personal data. Specific reaction, movement, security code or fingerprints must be provided when the mobile is locked [160, 193].

Benefits related to sensor authentication usability

Varied and powerful sensors exist during the period of rapid development of mobile devices. The latest generation of smartphones is particularly loaded with sensors, including GPS, vision cameras, microphones, light, smart thermometer, compasses and acceleration sensors [187]. Modern mobile devices are characterised by numerous sensors that enable a large area of interactions. However, some of these sensors have weaknesses that cause access to user input [194]. Many modern mobile sensors include the extraction of required parameters within the scope of their uses [195]. Authentication solutions based on biometrics are a promising approach to replace common mechanisms that rely on PINs or passwords, which are often perceived as inconvenient by users [95]. Biometrics is considered to be more reliable than non-biometric methods, which are used to prove the owner’s identity by merely confirming his possession through a particular confidentiality or the user’s knowledge. Biometrics has two types, namely, behavioural and physiological. These methods can effectively prevent identity theft and unauthorised access to any of the mobile terminal resources [95, 107, 108, 196]. Smartphone devices that support biometrics are available from many of the major service providers, thereby decreasing the price of biometrics sensors [108, 122, 196]. The considerable potential of non-obtrusive gait biometrics measurements is shown by the accelerometers directly embedded in the characteristic motion of users [197,196,199]. Smartphone users have appropriate authentication methods in addition to the accelerometer in these devices [185]. Accelerometers have become a highly important tool because of their effectiveness in activity recognition. They are inexpensive, small, efficient and only require minimal energy; they are also insensitive to environmental conditions [123, 180, 197, 200,199,200,203]. Although most smartphones are equipped with a front-facing camera, facial recognition, a popular biometric authentication technique, is rarely used in practice for device unlock or website/application login in smartphones [107, 173, 204]. In addition, Muaaz and Mayrhofer (2016) suggested that gait authentication using a mobile phone based on accelerometer sensor offers an unobtrusive, user friendly and periodic manner of authenticating individuals to their smartphones [205,204,207].

Benefits related to sensor security

The possibility of losing mobile phones leads to security threats on one’s personal data [119]. Thus, the effectiveness of information from the built-in orientation sensor for user authentication has been explored [175]. The potential of smartphone sensors (e.g. accelerometers and gyroscopes) has been widely explored in gait-based authentication [208]. Ketabdar (2012) proposed a new authentication method based on 3D signature for mobile devices. The 3D signature is manually created in air using an appropriately shaped magnet (a rod or ring) [166]. This method is based on influencing the compass or accelerometer sensor embedded in the new generation of mobile devices [166, 201]. Each user of these smartphones has his own style when clicking the touchscreens [113]. Personal patterns are reflected on the intensity and difference in rhythm and the corner of the preferred applied force. User behaviour is effectively captured because smartphones are equipped with different sensors, such as gyroscopes, accelerometers and touchscreens [162, 163]. However, Ling (2016) suggested that oily or thermal residues remain on the touchscreen, thereby leaving a visible effect that can be detected by the naked eye. Thus, the movement of the finger can be analysed, which can lead to an attack depending on the motion sensor [111]. Biometric gait authentication using accelerometer sensors based on personal mobile device offers a user friendly, unobtrusive and periodic approach in authenticating individuals [115, 168, 209, 210]. Given that gait is biologically less biometric and unobtrusive, which are major advantages over other biometrics, gait considerably differs from other biometrics because it does not require any physical connection. Through a remote camera or some sensors, the moment can be easily captured as long as the device is connected to the person. Biometric gait can also be used for documentation purposes in mobile devices [196]. The system becomes multilayer for authentication and utilises the user gait pattern and location traceability for authentication without creating noise. The system also interacts with the user of the device when it provides the password, which comprises a series of emotions and cannot be used in the device if any defect exists in the location traces or gait pattern. If the user fails to provide an accurate behaviour, then the system asks the user regarding the description of the image context that has been previously stored for the user [211].

Many attempts have been made to use sensor noise in identifying and authenticating a device. Most of these developments have occurred in smartphone sensors, such as gyroscope and light sensors. The implication of sensor fingerprint isolation is that any third party using multiple sources may effectively track user movements without using cookies [161]. The accelerometer and gyro sensors record the displacement and rotation of the mobile device during the gesture. A sensor fingerprint is generated for the user when the two sensors are combined. Every time the user performs one of the unlocking gestures, the device is slightly displaced and rotated. The displacement and rotation of the device is evidently reflected in the accelerometer and gyro sensor data [92]. Wong suggested that the fingerprint sensor, which is installed in many electronic gadgets ranging from portable mobile devices to high-end PCs, has become increasingly popular [159]. Apple’s touch ID sensor enables fingerprinting for iPhone 5 s or 6/6 Plus or other iOS devices; however, this fingerprint sensor is currently unavailable on most smartphones. Recent research reveals that conventional smartphone password systems are unsafe [170].

Benefits related to application activities

Mobile applications related to online financial transactions have been developed to provide convenience to users [107]. Smartphone motion sensors measure the movement and orientation of the phone in space, and sensors have been used in a wide variety of tasks, notably in gaming applications [194]. Activity recognition has become a key research field due to its application in many different areas, such as healthcare, fitness, industrial application, security and entertainment. [200]. Accelerometer data are applied to many types of automated gait analysis algorithms [191, 198]. Mobile phones have become immensely popular in recent years. Location-based services have attracted user interests with many popular applications on mobile phones. These applications provide access control, authentication, advertisements and other important functions based on the location of mobile users [212]. Mobile applications also effectively allow sensitive processes to be operated in this mode, such that they are secure from any malware that may be present in the normal world [120]. In the software-based authentication category, knowledge-based authentication systems often fulfil limited training, rapid process of authentication and global use. However, the effectiveness of the present authentication systems in removing forbidden access and reducing faulty access denial remains unclear. Smartphone devices can obtain a perfect reply to those questions posed by sensors built into those devices. Smartphones can also be used to gather different attributes of a person’s behaviour or nature because they have many built-in sensors. Most people have habits that are influenced by their behaviour depending on the environment [211].

Challenges

Sensor-based smartphones that verify client access to the gadget do not effectively provide sufficient information guarantee. In the academic literature, researchers have reported numerous challenges related to sensors and their utilisation in security. The main challenges are categorised and reported in the following subsections alongside their references. Figure 13 depicts the main challenges reported in the academic literature related to the reviewed articles.

Fig. 13
figure 13

Challenges for sensor-based smartphone authentication

Concerns on data access

Data access is one of the main challenges in authentication. In 2013, explicit authentication was ineffective for devices that relied upon it. When a mobile phone is stolen, the thief gains access to important and personal information and can use services provided by the device based on the stored password. In addition, the medical files of the elderly and the disabled can be easily accessed without the complexities of passwords; thus, the security of their devices should be ensured [119]. The coordinates of the position are used by dragging the image of the underlying context-aware system and excluding this information from a challenging classification scenario [213]. Personal data are subject to threats due to the possibility of theft or loss of a mobile device. More specifically, elderly and physically disabled users face difficulties in using screen patterns and entering PIN codes or cannot explicitly authenticate [119, 193]. They confirm that the data are secured and accessible on the smartphone by ensuring that the authorised user is the only person who can access the device [200].

Concerns on data protection

Security risks constantly emerge in relation to mobile devices, thereby posing a serious threat to the privacy of the users and the security of information when the device is lost or stolen [191]. Developing new authentication techniques require improved user friendly authentication process with less user involvement in addition to security and data protection [119].

In the web service module, complex passwords are stored in the smartphone with no requirement of repeated typing whenever needed [210]. However, in a trusted module, this particular device should be registered via a trusted module whenever a user attempts to access a web service [210]. The user authentication system allows the implicit identification module to retain the memory-based response and store it in a secure area; environmental and biometric measurements can also be used to verify security frequently [211]. This condition results in the following two potential issues. Firstly, passwords are the main sources of security sensitivity because they are overwhelmingly simple to reuse or guess and share with others and are susceptible to social engineering attacks. Secondly, the mobile system requires complete authentication to secure applications or data on a smartphone device, thereby resulting in serious usability issues [163]. Mobile applications should continue to operate and protect user privacy through a non-intrusive and easy Approach. mobile computing platforms face these challenges that will extend to the next generation [214]. Manufacturers claim that the track pattern scheme may be unsafe. As the major drawback, the operation of a track pattern leaves an inerasable track on the screen. If the track is recovered, then the track pattern can be easily hacked [171, 195]. Another important aspect is payment processing, which faces new security challenges from these developments [120].

Concerns on usability of authentication

Conventional authentication mechanisms, including graphical or alphanumeric passwords, require the user to remember a unique combination of information [122, 215]; therefore, weak passcodes for ease of memorisation are selected [163, 191]. Consequently, evaluating a proof of concept implementation should be at an acceptable level of feasibility and usability in the direction of deploying such a system in real-world scenarios. A trade-off exists between usability and security [113, 125, 165]. The security measures required should be increased, thereby discovering novel safety methods [121, 180, 200]. Smartphones can contain large amounts of personal data but are often unsafe. Studies show that PIN locks are unsuitable for use and therefore experience low dependence (33% of users) [193]. Researchers have raised the challenge of implementing implicit documentation by building their own model, creating a user profile and ensuring that privacy is maintained for the purpose of data integrity, which is provided to the user at the same level of security for explicit authentication methods [119, 192]. Security is also one of the main research challenges in the production task.

Therefore, the developers of these programs must maintain the balance between ensuring the usability and all the security requirements of an organisation; the establishment of testing and environment is required to evaluate the performance of new safety mechanisms to improve the system usability [211]. A trade-off exists between the security and usability of smartphone devices. One-shot authentication solutions are defenceless against theft and loss [185], whereas spontaneous logouts or periodic authentication following intervals of idleness are likely to be counterproductive [165]. The created classifier is unsuitable, and the enrolment must be repeated, thereby resulting in low usability [206].

Behavioural studies have examined the biometrics of the mobile device motion to locate its possible authentication accuracy on an Android phone [167, 177] and the pressure cannot be easily imitated because it is equal to the tapping power divided by the touched area [163]. One of the challenges is that independent workers must be simultaneously adjusted. The main reason (in 74% of the cases) for this lack of security is a demand for fast access, that is, security does not coincide with usability in mobile devices [213]. An inconspicuous authentication system may supply a relatively high usability but has low security access control. For the smartphone device scope, usability is critical because users do not want to be cut off from their workflow to verify their identity [118, 165]; moreover, it covers various input situations with additional feature sets and increases the practice period [163]. Particularly, the gait, cannot be easily identified in different orientations, especially when this pattern is the most vulnerable to external conditions and influences [199]. Identification systems are applied in practical conditions but are considered to have unsteady quality or low smartphone gait verification accuracy rate [123, 196].

Concerns on data collection

One of the main challenges faced by developers in sensor-based authentication is data collection. As a result of the data collection, a dataset is developed to produce further testing and enhancements instead of spending a considerable amount of time, money and efforts for data collection. Such datasets can help improve the quality of a particular authentication technique. In a study by Sun and Wang [43], 19 users were tested in an authentication process for a total of 76.520 times. The devices required collection and data analysis on existing smartphones that were unavailable, thereby creating further burden on the developers [108]. Researchers that worked on orientation-based authentication have reported that the composite outputs of all three axes are more regular than those of individual axes [184]. They have also reported that the variance in gait period has slow and normal style of walking for 5 min [184, 206, 209]. Two issues raised by Shih and Shih [121] were as follows. The first issue pertains to the required investigation on the feasibility of using behavioural biometric accelerometer data collection and touchscreen fingertip on a smartphone (the data can help developers to design new smartphone authentication techniques); the second issue is related to the accuracy of the data during data acquisition (e.g. iris patterns or fingerprints) [112, 121, 162, 203]. The other issue is related to determining difficulties of the accurate dimension (e.g. walking towards high places). The errors in the division layer may spread to the next processing stages. Therefore, the system efficiency can be compromised. Finally, dissimilar gait signals extract reliable features that may result in problems [123].

Concerns on physiological biometrics

The challenges in authentication are related to behavioural biometrics for a number of reasons. Firstly, a person with complicated malicious intentions can easily capture a normal movement compared with a fingerprint or even a password [160]. Secondly, the CA also involves natural movements, such as walking with the device, holding it against the user’s ear and carrying the device [167]. Thirdly, light sensors are used to defend against 2D virtual camera and media attacks without penalty speed authentication [204]. Using the authentication of physiological biometrics on the smartphone platform shows several disadvantages. Firstly, the person should provide certain measurements, such as face, voice, teeth and signature, which cause difficulty and discomfort in data collection. Secondly, these measurements are vulnerable to attacks by penetration, such as attacks using spoof and the suffering from repeated attacks [108, 173]. Dynamic biometrics face several challenges, including high intra-class variation and the imitation threat of skilled forgers of the dynamical movement [95].

Simple algorithms that can facilitate movement based on biometric authentication have been presented and demonstrated that smartphone motion sensors have sufficient quality for biometric applications. On the basis of an acceptable 10% false rejection rate (FRR), which is comparable to an alphanumeric password-based entry, the false acceptance rate (FAR) is 0.02% [95]. Although all other modalities of biometrics are similar, this behavioural method faces two fundamental challenges, namely, intra-class similarity and variability [164]. This threat excludes the potency of opening the smartphone and larceny of a genuine biometric template [164]. Thus, additional or highly demanding hardware is often needed [113].

Concerns on simulation scenarios

A simulation scenario is somehow related to data collection, where developers propose a scenario for data collection. This scenario includes the number of users and the steps in performing the experiment. Different conditions and scenarios have been designed and proposed by researchers to validate a newly developed approach. Researchers randomly suggest the number of participants, scenarios of data collection and testing environments [108].

The sensor-based signature technique uses either magnetic or orientation sensors to authenticate users. Different from the traditional handwritten signature, this technique must be performed in air by holding the smartphone [122] or using a magnet to perform a 3D magnetic signature in space around the device [166, 178]. In this case, the training data are cached from multiple sensor orientations via artificially rotating available training data [197]. However, the possibility of trusting gait signals is raised for effective IA. Thus, the viability of all the current solutions fails in reality because they rely on fixed sensors to a specific position and orientation [123]. The main challenge of modelling gait for authentication is using an unsupervised learning technique that learns a nominal model of the user’s gait based on the training data, which is used to flag anomalous gait signatures of an adversary [216].

Concern on sensors and authentication methods

Different sensors can provide different authentication techniques, and replicating or simulating authentication techniques require different sensors with special aspects. Therefore, exploring new sensor-based authentication techniques requires a comprehensive understanding of the sensor behaviour, specification, output data and visible action provided by a particular sensor.

Therefore, if a researcher explores a handwaving action as a biometric, then he is initially required to elaborate on the uniqueness of the handwaving from one user to another. Then, he should identify the appropriate motion sensor to provide this motion [114]. Roshandel proposed that user movements of an appropriately shaped magnet around the device deform the original magnetic field [178]. In addition, the sensor must be economical, simple for wide deployment and energy-efficient. Therefore, Yang [217] proposed using a three-axis accelerometer to extract stable and individual characteristics from the gesture action of users. Lyu [212] used CLIP with accelerometer sensor; CLIP uses a low-power inertial accelerometer sensor with a lightweight entropy-based commitment mechanism that can authenticate the mobility trace of users without any cost of trusted hardware. In such a solution, user input, technique and interaction affect the result of authentication [165, 198]. Behavioural biometrics requires data collection from the accelerometer sensor to authenticate smartphone users [183]. Researchers in behavioural biometrics have attempted to test the accuracy of the authentication technique, the effective feature for the authentication technique and the difference between users in the authentication process [124, 175, 198]. Arm flexing when picking the mobile phone is another behavioural biometric proposed in the literature. This method is combined with the ear-shape approach to authenticate smartphone users [169].

The traditional authentication methods, such as using PINs and passwords, require explicit interaction and are thus time-consuming and complicated [202]. In addition, classifier selection is reported to be a challenging task due to its complexity, execution time and classifier accuracy [162].

Recommendations

We provide several recommendations that aim to mitigate the challenges faced by developers, users and researchers in preventing smartphones from being utilised by unauthorised users. Figure 14 presents the recommendation categories for sensor-based smartphone authentication.

Fig. 14
figure 14

Recommendation categories for sensor-based smartphone authentication

Recommendations related to users

Many smartphone users with highly sensitive data require substantial advice and recommendations to follow safe practices in their daily use. The users should be careful when using smartphones. The location of a smartphone user can be found using the sensors of the device, and his activity information can be obtained [183]. More secure techniques than the traditional username/password and similar methods are available; thus, users are required to use advanced authentication approaches [122]. Usability is one of the reasons why users do not use advanced authentication techniques. Lee [114] suggested a simple system using an accessory that users can carry in public every day; the gestures of tapping and manipulating a mobile phone make the recognition process easy and seamless. Sufficient gait or location data are available, wherein some developers can detect an adversary in 50 s. Google Play API uses the inconspicuous label of data to obtain algorithms of supervised learning without clear user explanation [216]. However, CHAS involves automatic updating, in which the framework updates new data over time without the need for retraining [117].

Recommendations to developers

Developers or security providers have an important role in creating new authentication techniques. Several research recommendations are obtained from the studies of developers. Behavioural authentication that involves gestures is one of the sensor-based authentication methods. This type of authentication technique has good application prospect due to difficulties in replication or copying without the need for additional hardware support [179]. The data collected from these sensors can distinguish mobile users by analysing the user interaction with the device [179]. Smart sensors are suitable techniques to supply the IA [119]. This type of biometric approach can provide authentication in the background service. However, developers should be aware that not every feature is obtained as expected [121]. Orientation sensors can provide numerous features (e.g. in some experiments, 53 features were extracted from the orientation sensors alone), which lead to acceptable feasibility for such approach [124]. User behaviour models may contain multiple features of the user activity and the mobile device’s response; a verification strategy should also be planned [121, 126]. A unique recognition model, where gait models are directly stored in the device that works effectively regardless of the position, is developed [123]. If this authentication fails, then an explicit authentication should provide a backup authentication model [119]. Authentication on the background service is required to verify the users. However, unconditional or unrestricted access to the sensors might enable attackers to track the smartphone [203].

In addition to a process that habituates users to their gestures at the enrolment phase, the optimal updating phase of the templates should be investigated to amend the deviation in the long term [189].

Recommendations to researchers

Five main directions found in the reviewed articles related to the present and future research were obtained. The first direction was the device size, wherein the literature reported that the newly developed authentication technique should be flexible with the device size or layout. Some researchers considered the effect of posture rather than that of device size. Liu et al. found a resilient authentication method against the device size [113]. The second direction was the recommendation related to feature selection. The most challenging tasks were biometric combination and feature selection [121]. Nguyen [123] proposed feature selection, which is an option to increase the usability of smartphones rather than providing a replacement for schemes of standard authentication on the smartphone due to the increase in privacy expectation. The result could be improved if the developers or researchers could apply improved gait segment detection strategy [123]. The third direction was related to the development of datasets by which researchers could test new techniques on the same data rather than collecting data with each experiment. Additional algorithms should also be proposed to compare the different performances of determining gestures [218]. The environment of the experiment was the fourth direction to produce feature research. The literature suggested that the new authentication techniques effectively performed in a controlled environment. Changing the position of the smartphone or other environment constraints, such as position of the phone, would affect the uncontrolled environment [206]. In addition, most of the experiments were performed in a single sitting; the researchers recommended collecting trials over multiple sessions to ensure verity in the environment [167]. Finally, in the evaluation process, one of the interesting questions related to scalability evaluation was how long users would need to train their devices and the response of real-time classification on smartphones for a large number of users [112].

Methodological aspects of previous studies

Experimental research required references to justify the methodological aspects of previous research, particularly the number of samples, the type of device, the type of analysis, age and gender of participants, number of attempts, time period and evaluation technique. This information is important in the research methodology during exploration of a new authentication technique, as shown in Fig. 15.

Fig. 15
figure 15

Methodological aspects illustrated from previous studies

Sample size

In this section, we tabulate these aspects from the selected studies. The largest portion of research articles (28) suggested a sample size between 2 and 20 participants, whereas nine articles used a dataset from other research articles. Only eight articles did not mention the number of participants.

The literature stated that 60 articles were used and reported as the sample size in the development of their experiments. Amongst these articles, 46% (n = 28/60) used 20 participants or less, whereas 23% (n = 14/60) of the 60 research articles used between 20 and 40 participants (23). In total, 70% (n = 42/60) of the articles used a sample size from 2 to 40 participants. Another 10 articles used datasets collected by other researchers; however, these articles did not report the number of participants. The last 11 articles discussed the frameworks with no data collection process, following the majority of the academic literature. Figure 16 presents a number of samples according to the academic articles in the second layer.

Fig. 16
figure 16

Number of samples according to academic articles in the second layer

Age group

The age category varies in sample selection, as shown in Table 1. Most participants in different experiments are between the ages of 16 and 67 years.

Table 1 Age group distribution

On the basis of the literature, 20 different age groups were reported in 25 articles that reported the sample age in the development of their experiments. Only 5 age groups were presented in 2 different studies, whereas 20 studies introduced different age groups. The variety of age groups causes difficulty in selecting only one study from amongst a multitude.

Gender

The gender of the participants is important for the comparison of different gender groups. However, none of the studies analysed or compared gender groups. Therefore, only 26 research articles mentioned the gender of the participants, whereas the others (excluding the articles that used datasets) did not. Table 2 shows the details of gender distribution per article. The table includes the articles that mentioned the gender of the participants in the 26 studies out of the total number of screened articles.

Table 2 Gender distribution

Figure 17 presents the ratio of different genders per study. From the figure, the ratio of male participants is higher than that of females. A total of 26 articles mentioned gender. Gender distribution in the previous research articles was conducted without evident basis. The average of male participants from the total participants in the selected studies was 69.9%, whereas the female participants achieved a total average of 31.1% of the total participants. Two studies equally distributed the number of participants between the two genders. Only one study preferred female over male.

Fig. 17
figure 17

Visualisation of gender distribution

Frequency of attempts, iteration and time interval per experiment

In biometric research, use, repeat and remember are considered the most desired criteria for biometric performance measurement with respect to user experience, which is regarded as a part of the usability performance test. Table 3 shows the 19 articles that described the time interval for repetitions of the experiments per user.

Table 3 Frequency of iteration attempts

The number of attempts per participant is not standardised. Different experiments proposed different attempts.

Time interval is another configuration illustrated from previous studies. Time interval represents the total period of the experiments. Researchers proposed four different time interval types. The first system used seconds as time interval, in which developers repeated the experiment with participants per second. The minimum time interval was 2 times every 5 s, whereas the maximum was repetition of experiment twice every 442 s. The second system used minutes as time interval, with minimum repetition of 10 times every 3 min and maximum of 2 times every 60 min. The third system used days as time interval, with minimum of 10–40 times in one day and maximum of 7 times in 30 days. The last system used week time interval, with minimum repetition of 2 times during the week and maximum of 16 times for 6 weeks. Figure 18 describes the four time interval systems used in the articles. Only 29 articles mentioned the time interval when they reported their experiment configuration.

Fig. 18
figure 18

Different time interval systems in (a) seconds, (b) minutes, (c) days and (d) weeks

Table lists the different time interval systems and time used in each system (Table 4).

Table 4 Different time interval systems

Equipment

The selected studies utilised various types of smartphone devices. The first impression states no evident bases for device selection. However, sensor availability and ease of developments play important roles in selecting the device and operating system.

From our observation, the majority of the developments were conducted with devices that operate on Android rather than iOS; however, a number of iOS-related developments also exist. Figure 19 describes the devices utilised in the previous studies. Only 33 research articles mentioned the device type in their experiment configurations. A total of 12 devices were used in the previous experiments. The most frequently used devices were Nexus (seven times) and Samsung (six times). Other devices, such as Sony, Huawei, OnePlus, HTC, LG, iPhone, iPod, Moto and Motorola, were used only once, twice or thrice. Nexus is developed by different companies, such as Samsung, Motorola and Google. A total of 28 devices used in the previous experiments used the Android operating system whereas five devices used iOS. Android is more utilised than iOS due to its ease of development.

Fig. 19
figure 19

Devices used in previous studies and frequency of usage

Performance analysis

The researchers adopted standard quality testing for evaluation techniques. Usability metrics are used to obtain results of the authentication technique. These metrics include FRR and FAR, which are the two measurements used for performance evaluation of the authentication technique. A total of 49.3% (n = 40/81) articles used the two measurements in their developed experiments. The two metrics were used to clarify the trade-off between ease of use and security achieved by the authentication solution. FAR is the decision percentage of authentication that allows access to an unauthorised user, whereas FRR is the decision percentage of authentication where an authorised user is denied access.

A solution that shows a decrease in FAR and an increase in FRR is secure but complicated whereas that which shows a low FRR and a high FAR is usable but less secure. Figure 20 depicts that FAR is high when the usability is high [113, 117, 165].

Fig. 20
figure 20

High usability with high FAR and low FRR [165]

Sensors utilised in previous studies

A number of sensors were utilised to authenticate users with their smartphones. Our investigation of the academic literature identified that the orientation (e.g. accelerometer, gyroscope and magnetic sensors), finger, camera and touchscreen sensors were used. As reported in the literature, the usage frequency of these sensors is as follows: fingerprint sensor (n = 4/72), orientation sensor (n = 60/72), camera sensor (n = 2/72) and touchscreen sensor (n = 6/72). The microphone sensor was unexplored, whereas the touchscreen sensor was utilised six times. None of the articles mentioned the usage of 3D touch sensors (see Fig. 21).

Fig. 21
figure 21

Sensors utilised in academic literature

Conclusion

This study aims to provide an updated substructure of authentication techniques for sensor-based mHealth. The research focuses on the directions that address this subject. The first layer of our taxonomy, that is, security and privacy of sensor-based telemedicine applications, is presented, and the studies related to the security issues are analysed and discussed in three tiers. In the second layer of our taxonomy, comprehensive survey focuses on previous articles on documentation techniques without applications. We also reviewed the new direction in using sensor-based smartphone authentication as innovative side channels to conclude taps on mHealth sensors in telemedicine application. This development resulted from the increasing popularity and wide deployment of sensor applications and patient privacy risks and low level of security awareness in telemedicine application. All recent and published works on sensor-based smartphone authentication were surveyed, and the findings and important contributions were highlighted. The first contribution is the provision of taxonomy in this research based on the literature. The second layer is divided into the following three main categories: defence, attack and others. The taxonomy can also provide the researchers with novel ideas in several related topics. In the second contribution, we covered the main highlights of the selected studies, including motivations, challenges and recommendations. We highlighted the motivation benefits related to smartphone usability, effect of security on smartphones, sensor authentication usability, sensor security and application activities. Our analysis raised several concerns reported by researchers. Therefore, we highlighted these challenges concerning protection, access and collection of data and all-inclusive understanding of the authentication method and usability, its sensors and biometrics. In addition, we emphasised the recommendations related to users, developers/providers and researchers. In the last contribution, we focused on the methodological aspects of the previous studies, which covered the sample size (number of participants); age and gender of participants; devices, type of sensors, evaluation techniques and operating systems in the previous experiments; and experimental configurations. To the best of our knowledge, our study is the first endeavour to provide a multilayer comprehensive overview of the sensor and security in telemedicine architecture and sensor-based smartphone authentication in the literature to match benefits to mHealth authentication security and privacy. We hope that other researchers will benefit from this study and use it as a starting point to expand the research further based on the challenges we discussed.