Authors :
Kelvin Dawandakpoye Onajite, Adjogri; Ikelegbe, Gabriel Joseph
Volume/Issue :
Volume 11 - 2026, Issue 2 - February
Google Scholar :
https://tinyurl.com/ft3c7v8x
Scribd :
https://tinyurl.com/yc4t7vy5
DOI :
https://doi.org/10.38124/ijisrt/26feb981
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Passwords have long been the cornerstone of digital authentication, but their inherent limitations—such as
vulnerability to phishing, weak user choices, and the burden of management—have created critical security gaps. This
systematic literature review explores the emerging paradigm of Passwordless authentication, analyzing its core components:
biometrics, behavioral analytics, and the overarching principle of Zero-Trust Architecture (ZTA). The objective is to
provide a comprehensive overview of how these technologies are converging to create more secure and user-friendly
authentication systems.
The review finds that biometric methods (like fingerprints and facial recognition) offer strong security but raise
significant privacy concerns and are not foolproof. Behavioral analytics, which continuously verify users based on patterns
like keystroke dynamics or mouse movements, provide a passive, persistent layer of security that is difficult to mimic.
Crucially, these methods are most effective when integrated within a Zero-Trust framework, which operates on the principle
of "never trust, always verify," thereby eliminating inherent trust from any network.
The key contribution of this review is a synthesized analysis demonstrating that the future of authentication is not a
single technology replacing the password, but a multifaceted, adaptive system. The outlook points toward a future where
continuous, risk-based authentication, combining biometrics and behavioral analytics under a Zero-Trust model, will render
the static password obsolete, creating a more resilient security posture.
Keywords :
Passwordless Authentication, Biometrics, Behavioral Analytics, Zero-Trust Architecture, Continuous Authentication.
References :
- Abi, R. (2025). AI-Driven Fraud Detection Systems in Fintech Using Hybrid Supervised and Unsupervised Learning Architectures. Int. J. Research Publication and Reviews, 6(6), 4375-4394.
- Altwaijry, N. (2023). Authentication by keystroke dynamics: The influence of typing language. Applied Sciences, 13(20), 11478.
- Alwajeeh, M. S., Sufyan, M. M. A. E., Al‑Sarori, M. H., Al‑Asaly, M., & Al‑Maamari, G. A. A. (2026). A Systematic Review of Cognitive Passwords: Limitations, Challenges, and Solutions. Journal of Intelligent Communication, 5(1), 1-23.
- Angelogianni, A., Politis, I., & Xenakis, C. (2024). How many FIDO protocols are needed? Analysing the technology, security and compliance. ACM Computing Surveys, 56(8), 1-51.
- Aramide, O. (2024). Zero-trust identity principles in next-gen networks: AI-driven continuous verification for secure digital ecosystems. World Journal of Advanced Research and Reviews, 23(3), 3304-3316.
- Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
- Badhib, A., Alshehri, S., & Cherif, A. (2025). IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. Sensors, 25(24), 7619.
- Bisogni, C., Cascone, L., Nappi, M., & Pero, C. (2024). Iot-enabled biometric security: enhancing smart car safety with depth-based head pose estimation. ACM Transactions on Multimedia Computing, Communications and Applications, 20(6), 1-24.
- Constantinides, A., Belk, M., Fidas, C., Beumers, R., Vidal, D., Huang, W., ... & Pitsillides, A. (2023). Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations. ACM Transactions on Computing for Healthcare, 4(1), 1-40.
- Devidas, S. (2025). Biometric Authentication UX: Best Practices for Face ID, Fingerprint & Iris Scans. International Journal of Emerging Trends in Computer Science and Information Technology, 6(4), 125-127.
- Edriss, S., Romagnoli, C., Caprioli, L., Zanela, A., Panichi, E., Campoli, F., ... & Bonaiuto, V. (2024). The role of emergent technologies in the dynamic and kinematic assessment of human movement in sport and clinical applications. Applied Sciences, 14(3), 1012.
- Fathima, A. R., & Saravanan, A. (2024). An approach to cloud user access control using behavioral biometric-based authentication and continuous monitoring. International Journal of Advanced Technology and Engineering Exploration, 11(119), 1469.
- George, A. S. (2024). The dawn of passkeys: Evaluating a passwordless future. Partners Universal Innovative Research Publication, 2(1), 202-220.
- Gorbenko, I. D., & Kandii, S. O. (2025). National and International Post-Quantum Standards for Asymmetric Transformations. Cybernetics and Systems Analysis, 61(4), 659-670.
- Gündüz, G. (2025). A Mobile Touch-Based Continuous Authentication System via User-Specific Distribution Based Learning (Master's thesis, Middle East Technical University).
- Imtiaz, A., Nasim, F., & Ambreen, S. (2023). EFFECTS OF COGNITIVE LOAD AND PASSWORD STRENGTH ON STUDENT PRODUCTIVITY. Contemporary Journal of Social Science Review, 1(2), 43-67.
- Kaneriya, J., & Patel, H. (2023). A secure and privacy-preserving student credential verification system using blockchain technology. International Journal of Information and Education Technology, 13(8), 1251-1260.
- Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and application of zero trust security: A brief survey. Entropy, 25(12), 1595.
- Karangara, R. (2025). Adaptive Machine Learning Models for Securing Payment Gateways: A Resilient Approach to Mitigating Evolving Cyber Threats in Digital Transactions. Artificial Intelligence Evolution, 44-64.
- Khan, S., Devlen, C., Manno, M., & Hou, D. (2024). Mouse dynamics behavioral biometrics: A survey. ACM Computing Surveys, 56(6), 1-33.
- Kilany, S., & Mahfouz, A. (2025). A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. Scientific Reports, 15(1), 30861.
- Kommuri, V. A., & Shaik, K. B. (2025). Innovative passwordless authentication approaches in IoT identity management. Majlesi Journal of Electrical Engineering, 19(2 (June 2025)).
- Maharani, W., & Gani, P. H. (2025). Digital footprints and personality prediction: integrating methodological innovations and ethical considerations in social media analysis. Neural Computing and Applications, 37(30), 24953-24996.
- Malik, G. (2024). Biometric Authentication-Risks and advancements in biometric security systems. Journal of Computer Science and Technology Studies, 6(3), 159-180.
- Mansur, M. (2025). A Quantum-Safe Interoperable and Decentralized Payment Infrastructure for the Post-Classical Era as a Strategic Framework for Secure Global Transactions. European Scientific Journal, 21(19), 17-45.
- Martin, N., & Metzger, F. M. (2024). The chimera of control: Self-sovereign identity, data control, and user perceptions. Human Technology, 20(2), 183-223.
- Mostafa, A. M., Ezz, M., Elbashir, M. K., Alruily, M., Hamouda, E., Alsarhani, M., & Said, W. (2023). Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication. Applied sciences, 13(19), 10871.
- Motamed, A. (2024). The Zero Trust Security Model and Its Application in Organizations. Journal of Resource Management and Decision Engineering, 3(3), 21-32.
- Ngandu, M. R., Mwansa, G., & Mkabe, Z. (2025). Strengthening cybersecurity in a government department by addressing password management challenges and human factor vulnerabilities. Discover Computing, 28(1), 148.
- Oduri, S. (2024). Continuous authentication and behavioral biometrics: Enhancing cybersecurity in the digital era. International Journal of Innovative Research in Science Engineering and Technology, 13(7), 13632-13640.
- Olabanji, S. O., Marquis, Y., Adigwe, C. S., Ajayi, S. A., Oladoyinbo, T. O., & Olaniyi, O. O. (2024). AI-driven cloud security: Examining the impact of user behavior analysis on threat detection. Asian Journal of Research in Computer Science, 17(3), 57-74.
- Paya, A., & Gómez, A. (2025). Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security: A. Paya et al. International Journal of Information Security, 24(4), 178.
- Prasad, A. (2025). Breaking Barriers: Passwordless Authentication as the Future of Security. International Journal of Computer Applications, 186(60), 29-35.
- Qudus, L. (2025). Advancing cybersecurity: strategies for mitigating threats in evolving digital and IoT ecosystems. Int Res J Mod Eng Technol Sci, 7(1), 3185.
- Ray, P. P. (2026). A Review of TRiSM Frameworks in Artificial Intelligence Systems: Fundamentals, Taxonomy, Use Cases, Key Challenges and Future Directions. Expert Systems, 43(3), e70213.
- Ruiu, P., Nitti, M., Pilloni, V., Cadoni, M., Grosso, E., & Fadda, M. (2024). Metaverse & human digital twin: Digital identity, biometrics, and privacy in the future virtual worlds. Multimodal Technologies and Interaction, 8(6), 48.
- Saha, S., Hota, A., Chattopadhyay, A. K., Nag, A., & Nandi, S. (2024). A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities. Artificial Intelligence Review, 57(7), 184.
- Shadman, R., Wahab, A. A., Manno, M., Lukaszewski, M., Hou, D., & Hussain, F. (2025). Keystroke dynamics: Concepts, techniques, and applications. ACM Computing Surveys, 57(11), 1-35.
- Shaout, A., & Patel, A. H. (2025). Evolving Security: A Comprehensive Analysis of Authentication Methods. Int. J. Advanced Networking and Applications, 17(03), 6922-6932.
- Sheikh, A. M., Islam, M. R., Habaebi, M. H., Zabidi, S. A., Bin Najeeb, A. R., & Kabbani, A. (2025). A survey on edge computing (EC) security challenges: Classification, threats, and mitigation strategies. Future Internet, 17(4), 175.
- Sriman, J., Thapar, P., Alyas, A. A., & Singh, U. (2024, January). Unlocking security: a comprehensive exploration of biometric authentication techniques. In 2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 136-141). IEEE.
- Würsching, L., Putz, F., Haesler, S., & Hollick, M. (2023, April). Fido2 the rescue? platform vs. roaming authentication on smartphones. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1-16).
Passwords have long been the cornerstone of digital authentication, but their inherent limitations—such as
vulnerability to phishing, weak user choices, and the burden of management—have created critical security gaps. This
systematic literature review explores the emerging paradigm of Passwordless authentication, analyzing its core components:
biometrics, behavioral analytics, and the overarching principle of Zero-Trust Architecture (ZTA). The objective is to
provide a comprehensive overview of how these technologies are converging to create more secure and user-friendly
authentication systems.
The review finds that biometric methods (like fingerprints and facial recognition) offer strong security but raise
significant privacy concerns and are not foolproof. Behavioral analytics, which continuously verify users based on patterns
like keystroke dynamics or mouse movements, provide a passive, persistent layer of security that is difficult to mimic.
Crucially, these methods are most effective when integrated within a Zero-Trust framework, which operates on the principle
of "never trust, always verify," thereby eliminating inherent trust from any network.
The key contribution of this review is a synthesized analysis demonstrating that the future of authentication is not a
single technology replacing the password, but a multifaceted, adaptive system. The outlook points toward a future where
continuous, risk-based authentication, combining biometrics and behavioral analytics under a Zero-Trust model, will render
the static password obsolete, creating a more resilient security posture.
Keywords :
Passwordless Authentication, Biometrics, Behavioral Analytics, Zero-Trust Architecture, Continuous Authentication.