Who wants Continuous Authentication on Mobile Devices?

被引:0
|
作者
Rasnayaka, Sanka [1 ]
Sim, Terence [1 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore, Singapore
关键词
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Continuous Authentication(CA) is the process of using biometrics to transparently authenticate the user. Since a CA system continuously checks for the presence of the logged in user it is more secure and facilitates schemes with multiple levels of security. CA is suitable for mobile platforms due to the ease of use, transparency and security it provides. We evaluate the usability of CA in a widespread manner by conducting a survey with roughly 500 respondents. This is the first paper to relate perceptions toward CA to the users security awareness. The perceptions of security towards biometrics based methods have improved over the last 20 years, compared to secret based methods. We show that now, biometrics are perceived to be more secure than other methods. We found that users see a requirement for multiple levels of security. Furthermore users are willing to adopt CA for mobile devices. We analyze factors like security awareness, gender and mobile device operating system, to draw statistically significant conclusions regarding their effect on users willingness to adopt CA and their perceptions about CA. The findings and major concerns highlighted in this paper should be considered when designing a CA system for mobile devices.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Gait Recognition as an Authentication Method for Mobile Devices
    Axente, Matei-Sorin
    Dobre, Ciprian
    Ciobanu, Radu-Ioan
    Purnichescu-Purtan, Raluca
    [J]. SENSORS, 2020, 20 (15) : 1 - 17
  • [42] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [43] Proximity-based authentication for mobile devices
    Jansen, W
    Gavrila, S
    Korolev, V
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 398 - 404
  • [44] Local authentication with Bluetooth enabled mobile devices
    Dellutri, F
    Me, GL
    Strangio, MA
    [J]. 2005 JOINT INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS AND INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICAS/ICNS), 2005, : 447 - 452
  • [45] Biometric Authentication System on Mobile Personal Devices
    Tao, Qian
    Veldhuis, Raymond
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (04) : 763 - 773
  • [46] Facial attributes for active authentication on mobile devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    [J]. IMAGE AND VISION COMPUTING, 2017, 58 : 181 - 192
  • [47] Proximity-based authentication of mobile devices
    Scannell, Adin
    Varshavsky, Alexander
    LaMarca, Anthony
    de Lara, Eyal
    [J]. International Journal of Security and Networks, 2009, 4 (1-2) : 4 - 16
  • [48] Ensuring Secured Iris Authentication for Mobile Devices
    Choudhary, Meenakshi
    Tiwari, Vivek
    Venkanna, U.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [49] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    [J]. PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314
  • [50] Efficiency of Paid Authentication Methods for Mobile Devices
    Jeong Yeon Kim
    [J]. Wireless Personal Communications, 2017, 93 : 543 - 551