Introduction
Existing mobile and IoT authentication methods depend on the user to input a password, pin, match a pattern, or use Two-Factor authentication methods to access the device. However, these techniques provide #ff0000 access over the system once the session starts. In parallel, the traditional methods cannot implicitly preserve active sessions without repeatedly interrupting the user's workflow to grant him/her access again. Therefore, this approach is not practical in scenarios where user identity needs to be continuously verified. In this context, continuous authentication has been proposed to authenticate the individual's identity who is trying to gain access over a system or entry point on an ongoing, real-time basis. Such a process begins with collecting user behavioral data from device sensors and sending it to an external server, which is processed using ML techniques. The ML trained from the user data can continuously evaluate the interaction behavior with the device and predict the user's identity as a background service without interrupting the user's activities.