A Comprehensive Survey on various Security Authentication Schemes for Mobile Touch Screen

被引:0
|
作者
Bhatt, Gaurav [1 ]
Bhushan, Bharat [1 ]
机构
[1] HMR Inst Technol & Management, Delhi, India
关键词
Security; Authentication; Pattern-based; PIN-based; Biometric; Verification; Scheme; Graphical-based; Attacks; Mobile phones; Method; DEVICES; SYSTEM; PHONE;
D O I
10.1109/CSNT.2020.46
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As technology is improving day by day, it is leading to a society in which there is a necessity of security for every system. Different strategies are proposed timely to overcome the security threats & vulnerabilities caused in previous strategies to protect the privacy of different users using mobile phones across the world as most of the crucial data of a user is saved in their smartphones. In this paper, we categorized the authentication scheme into four categories, namely PIN-based authentication, Biometric-based authentication, Pattern/Gesture-based authentication, and Graphical password authentication and development done in them over time. We further explore these categories and state there propose, limitation, result, vulnerabilities, and threats. A comprehensive taxonomy is provided for multiple authentication techniques for easy understanding. In addition, it also helps the students and the novice research to get an insight into the trending security techniques.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [1] Recent advances in mobile touch screen security authentication methods: A systematic literature review
    Ibrahim, Tahir Musa
    Abdulhamid, Shafi'i Muhammad
    Alarood, Ala Abdusalam
    Chiroma, Haruna
    Al-garadi, Mohammed Ali
    Rana, Nadim
    Muhammad, Amina Nuhu
    Abubakar, Adamu
    Haruna, Khalid
    Gabralla, Lubna A.
    COMPUTERS & SECURITY, 2019, 85 : 1 - 24
  • [2] A survey on touch dynamics authentication in mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    COMPUTERS & SECURITY, 2016, 59 : 210 - 235
  • [3] A Survey of Android Mobile Phone Authentication Schemes
    Kunda, Douglas
    Chishimba, Mumbi
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2558 - 2566
  • [4] A Survey of Android Mobile Phone Authentication Schemes
    Douglas Kunda
    Mumbi Chishimba
    Mobile Networks and Applications, 2021, 26 : 2558 - 2566
  • [5] A comprehensive security and performance assessment of UAV authentication schemes
    Mekdad, Yassine
    Aris, Ahmet
    Acar, Abbas
    Conti, Mauro
    Lazzeretti, Riccardo
    Fergougui, Abdeslam El
    Uluagac, Selcuk
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [6] A comprehensive survey on security, privacy and authentication in blockchain
    Alghamdi, Turki Ali
    Javaid, Nadeem
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (03) : 259 - 286
  • [7] Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones
    Zhou, Lina
    Kang, Yin
    Zhang, Dongsong
    Lai, Jianwei
    DECISION SUPPORT SYSTEMS, 2016, 92 : 14 - 24
  • [8] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [9] Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes
    Shim, Kyung-Ah
    IEEE ACCESS, 2018, 6 : 68804 - 68812
  • [10] DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application
    Incel, Ozlem Durmaz
    Gunay, Secil
    Akan, Yasemin
    Barlas, Yunus
    Basar, Okan Engin
    Alptekin, Gulfem Isiklar
    Isbilen, Mustafa
    IEEE ACCESS, 2021, 9 : 38943 - 38960