Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

被引:0
|
作者
Ferrag, Mohamed Amine [1 ,5 ]
Maglaras, Leandros [2 ,3 ]
Derhab, Abdelouahid [4 ]
Korba, Abdelaziz Amara [5 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Gen Secretariat Digital Policy, Athens, Greece
[4] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[5] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba 23000, Algeria
关键词
Security; Authentication; Mobile Computing Devices; Biometrics; USER AUTHENTICATION; ECG AUTHENTICATION; RECOGNITION; IRIS; NETWORKS; FEATURES; SYSTEM; FACE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we provide a comprehensive review of state-of-the-art results for biometric-based authentication schemes in mobile computing devices. We select and examine twenty biometric-based authentication schemes developed for mobile computing devices. We discuss current issues that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). Threat models and countermeasures used by biometrics-based authentication schemes for mobile computing devices are also presented. Throughout, we identify the pitfalls and limitations of the existing biometric-based authentication schemes for mobile computing devices. Based on the current taxonomy, we discuss the research problems and outline directions for future research efforts in biometrics-based authentication schemes for mobile devices.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 50 条
  • [31] Biometric Authentication System on Mobile Personal Devices
    Tao, Qian
    Veldhuis, Raymond
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (04) : 763 - 773
  • [32] A Flick Biometric Authentication Mechanism on Mobile Devices
    Shih, Dong-Her
    Lu, Chia-Ming
    Shih, Ming-Hung
    2015 INTERNATIONAL CONFERENCE ON INFORMATIVE AND CYBERNETICS FOR COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2015, : 31 - 33
  • [33] Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme
    Wan, Tao
    Jiang, Nan
    Ma, Jianfeng
    Yang, Lin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 163 - 170
  • [34] Understanding visual lip-based biometric authentication for mobile devices
    Wright, Carrie
    Stewart, Darryl William
    EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
  • [35] Model for adaptable context-based biometric authentication for mobile devices
    Wojtowicz, Adam
    Joachimiak, Krzysztof
    PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (02) : 195 - 207
  • [36] Understanding visual lip-based biometric authentication for mobile devices
    Carrie Wright
    Darryl William Stewart
    EURASIP Journal on Information Security, 2020
  • [37] Model for adaptable context-based biometric authentication for mobile devices
    Adam Wójtowicz
    Krzysztof Joachimiak
    Personal and Ubiquitous Computing, 2016, 20 : 195 - 207
  • [38] A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 367 - 372
  • [39] Privacy-Preserving Biometric-Based Remote User Authentication
    Tian, Yangguang
    Li, Yingjiu
    Liu, Ximeng
    Deng, Robert H.
    Sengupta, Binanda
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2265 - 2276
  • [40] Biometric-Based Authentication System Using Rough Set Theory
    Own, Hala S.
    Al-Mayyan, Waheeda
    Zedan, Hussein
    ROUGH SETS AND CURRENT TRENDS IN COMPUTING, PROCEEDINGS, 2010, 6086 : 560 - +