Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

被引:0
|
作者
Ferrag, Mohamed Amine [1 ,5 ]
Maglaras, Leandros [2 ,3 ]
Derhab, Abdelouahid [4 ]
Korba, Abdelaziz Amara [5 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Gen Secretariat Digital Policy, Athens, Greece
[4] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[5] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba 23000, Algeria
关键词
Security; Authentication; Mobile Computing Devices; Biometrics; USER AUTHENTICATION; ECG AUTHENTICATION; RECOGNITION; IRIS; NETWORKS; FEATURES; SYSTEM; FACE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we provide a comprehensive review of state-of-the-art results for biometric-based authentication schemes in mobile computing devices. We select and examine twenty biometric-based authentication schemes developed for mobile computing devices. We discuss current issues that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). Threat models and countermeasures used by biometrics-based authentication schemes for mobile computing devices are also presented. Throughout, we identify the pitfalls and limitations of the existing biometric-based authentication schemes for mobile computing devices. Based on the current taxonomy, we discuss the research problems and outline directions for future research efforts in biometrics-based authentication schemes for mobile devices.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 50 条
  • [41] Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems
    Nunes, Ivan De Oliveira
    Rindal, Peter
    Shirvanian, Maliheh
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 290 - 312
  • [42] ASSESSMENT OF THE VIABILITY OF A BIOMETRIC CHARACTERISTIC IN THE CONTEXT OF BIOMETRIC AUTHENTICATION ON MOBILE DEVICES
    Nawrocki, Piotr
    Kubaty, Wojciech
    COMPUTING AND INFORMATICS, 2021, 40 (01) : 169 - 194
  • [43] A Mobile Biometric-Based E-voting Scheme
    Alrodhan, Waleed A.
    Alturbaq, Ali
    Aldahlawi, Saud
    2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [44] Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices
    Temper, Marlies
    Tjoa, Simon
    Kaiser, Manfred
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 30 - 35
  • [45] Authentication of biometric identification documents via mobile devices
    Voloshynovskiy, Sviatoslav
    Koval, Oleksiy
    Villan, Renato
    Beekhof, Fokko
    Pun, Thierry
    JOURNAL OF ELECTRONIC IMAGING, 2008, 17 (01)
  • [46] Methodology for Evaluating Multimodal Biometric Authentication on Mobile Devices
    Tambascia, Claudia de Andrade
    Duarte, Robson Eudes
    Menezes, Ewerton Martins
    DESIGN, USER EXPERIENCE, AND USABILITY: THEORY, METHODS, TOOLS AND PRACTICE, PT 1, 2011, 6769 : 668 - 677
  • [47] Authentication system for biometric applications using mobile devices
    Hu, Jian-feng
    Mu, Zhen-dong
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 1224 - 1227
  • [48] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [49] An Improved Biometric-Based User Authentication Scheme for C/S System
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [50] PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication
    Tian, Yangguang
    Li, Yingjiu
    Liu, Ximeng
    Deng, Robert H.
    Sengupta, Binanda
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 82 - 89