Authentication of users on mobile telephones - A survey of attitudes and practices

被引:90
|
作者
Clarke, NL
Furnell, SM
机构
[1] Univ Plymouth, Network Res Grp, Sch Comp Commun & Elect, Plymouth PL4 8AA, Devon, England
[2] Edith Cowan Univ, Sch Comp & Informat Sci, Perth, WA, Australia
关键词
mobile; authentication; biometric; user survey; PIN;
D O I
10.1016/j.cose.2005.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-increasing functionality and services accessible via mobile telephones, there is a strong argument that the level of user authentication implemented on the devices should be extended beyond the Personal Identification Number (PIN) that has traditionally been used. This paper presents the results of a survey of 297 mobile subscribers, which attempted to assess their use of mobile devices, their use of current authentication methods, and their attitudes towards future security options. The findings revealed that the majority of the respondents make significant use of their devices, with clear demands for protection against unauthorised use. However, the use of current PIN-based authentication is problematic, with a third of the respondents indicating that they do not use it at all, and other problems being reported amongst those that do. In view of this, the respondents' opinions in relation to future security options are interesting, with 83% being willing to accept some form of biometric authentication on their device. The discussion considers these findings, and the potential applicability of the preferred techniques to mobile devices. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:519 / 527
页数:9
相关论文
共 50 条
  • [1] AUTHENTICATION OF MOBILE USERS
    MOLVA, R
    SAMFAT, D
    TSUDIK, G
    [J]. IEEE NETWORK, 1994, 8 (02): : 26 - 34
  • [2] Offending Users: Designing-in Deterrence with Mobile Telephones
    McCardle, John
    Storer, Ian
    Torrens, George
    Whitehead, Shaun
    Mailley, Jen
    Farrell, Graham
    [J]. DESIGN JOURNAL, 2011, 14 (03): : 323 - 342
  • [3] Comparison of different mobile telephones in Combi40+users
    Castro, A.
    Lassaletta, L.
    Bastarrica, M.
    Prim, M. P.
    De Sarria, M. J.
    Gavilan, J.
    [J]. ACTA OTO-LARYNGOLOGICA, 2006, 126 (07) : 714 - 717
  • [4] An effective approach for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. IEEE 55TH VEHICULAR TECHNOLOGY CONFERENCE, VTC SPRING 2002, VOLS 1-4, PROCEEDINGS, 2002, : 598 - 601
  • [5] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261
  • [6] Authentication of Mobile Users in Third Generation Mobile Systems
    Zhi-Jia Tzeng
    Wen-Guey Tzeng
    [J]. Wireless Personal Communications, 2001, 16 : 35 - 50
  • [7] Authentication of mobile users in third generation mobile systems
    Tzeng, ZJ
    Tzeng, WG
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2001, 16 (01) : 35 - 50
  • [8] USERS OF RADIO TELEPHONES
    FENNELL, C
    [J]. VETERINARY RECORD, 1970, 87 (22) : 700 - &
  • [9] Mobile telephones
    McIntyre, GT
    [J]. BRITISH DENTAL JOURNAL, 2000, 189 (09) : 467 - 467
  • [10] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    [J]. AEU-Archiv fur Elektronik und Ubertragungstechnik, 2002, 56 (05): : 293 - 297