Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

被引:0
|
作者
Ferrag, Mohamed Amine [1 ,5 ]
Maglaras, Leandros [2 ,3 ]
Derhab, Abdelouahid [4 ]
Korba, Abdelaziz Amara [5 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Gen Secretariat Digital Policy, Athens, Greece
[4] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[5] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba 23000, Algeria
关键词
Security; Authentication; Mobile Computing Devices; Biometrics; USER AUTHENTICATION; ECG AUTHENTICATION; RECOGNITION; IRIS; NETWORKS; FEATURES; SYSTEM; FACE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we provide a comprehensive review of state-of-the-art results for biometric-based authentication schemes in mobile computing devices. We select and examine twenty biometric-based authentication schemes developed for mobile computing devices. We discuss current issues that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). Threat models and countermeasures used by biometrics-based authentication schemes for mobile computing devices are also presented. Throughout, we identify the pitfalls and limitations of the existing biometric-based authentication schemes for mobile computing devices. Based on the current taxonomy, we discuss the research problems and outline directions for future research efforts in biometrics-based authentication schemes for mobile devices.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 50 条
  • [1] MultiLock: Biometric-Based Graded Authentication for Mobile Devices
    Aras, Shravan
    Gniady, Chris
    Venugopalan, Hari
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 100 - 109
  • [2] Secure Biometric-Based Authentication for Cloud Computing
    Wong, Kok-Seng
    Kim, Myung Ho
    CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2012, 2013, 367 : 86 - 101
  • [3] Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service
    Lu, Yanrong
    Zhao, Dawei
    COMPUTER COMMUNICATIONS, 2022, 182 : 22 - 30
  • [4] Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Zhu, Qiang
    You, Lin
    Hu, Gengran
    Wang, Shengguo
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33604 - 33623
  • [5] Biometric-based Remote Mutual Authentication Scheme for Mobile Device
    Chen, Sheng-Kai
    Leu, Jenq-Shiou
    Hsieh, Wen-Bin
    Wang, Jui-Tang
    Song, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1649 - 1664
  • [6] Multiparty biometric-based authentication
    Peyravian, M
    Matyas, SM
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 2000, 19 (04) : 369 - 374
  • [7] Biometric-based Remote Mutual Authentication Scheme for Mobile Device
    Sheng-Kai Chen
    Jenq-Shiou Leu
    Wen-Bin Hsieh
    Jui-Tang Wang
    Tian Song
    Wireless Personal Communications, 2022, 126 : 1649 - 1664
  • [8] Biometric-based user authentication in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    Leung, Victor C. M.
    Liu, Jie
    Lung, Chung-Horng
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 5 - 16
  • [9] A formal study of the privacy concerns in biometric-based remote authentication schemes
    Tang, Qiang
    Bringer, Julien
    Chabanne, Herve
    Pointcheval, David
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 56 - +
  • [10] Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2009, 26 (03) : 191 - 195