A Comprehensive Survey on various Security Authentication Schemes for Mobile Touch Screen

被引:0
|
作者
Bhatt, Gaurav [1 ]
Bhushan, Bharat [1 ]
机构
[1] HMR Inst Technol & Management, Delhi, India
关键词
Security; Authentication; Pattern-based; PIN-based; Biometric; Verification; Scheme; Graphical-based; Attacks; Mobile phones; Method; DEVICES; SYSTEM; PHONE;
D O I
10.1109/CSNT.2020.46
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As technology is improving day by day, it is leading to a society in which there is a necessity of security for every system. Different strategies are proposed timely to overcome the security threats & vulnerabilities caused in previous strategies to protect the privacy of different users using mobile phones across the world as most of the crucial data of a user is saved in their smartphones. In this paper, we categorized the authentication scheme into four categories, namely PIN-based authentication, Biometric-based authentication, Pattern/Gesture-based authentication, and Graphical password authentication and development done in them over time. We further explore these categories and state there propose, limitation, result, vulnerabilities, and threats. A comprehensive taxonomy is provided for multiple authentication techniques for easy understanding. In addition, it also helps the students and the novice research to get an insight into the trending security techniques.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [21] Security and Authentication in the Mobile World
    Tero Ojanperä
    Risto Mononen
    Wireless Personal Communications, 2002, 22 : 229 - 235
  • [22] Security and authentication in the mobile world
    Ojanperä, T
    Mononen, R
    WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 229 - 235
  • [23] A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks
    Al-Nasser, Ahmed
    Almesaeed, Reham
    Al-Junaid, Hessa
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (03) : 483 - 496
  • [24] A comprehensive survey on mobile browser security issues, challenges and solutions
    Debnath, Ninmoy
    Jain, Ankit Kumar
    INFORMATION SECURITY JOURNAL, 2024, 33 (05): : 593 - 612
  • [25] Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
    Ahmed, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Kumar, Neeraj
    Gadekallu, Thippa Reddy
    Jalil, Zunera
    Kryvinska, Natalia
    IEEE ACCESS, 2021, 9 : 115932 - 115950
  • [26] Channel assignment schemes for cellular mobile telecommunication systems: A comprehensive survey
    Katzela, I
    Naghshineh, M
    IEEE PERSONAL COMMUNICATIONS, 1996, 3 (03): : 10 - 31
  • [27] Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
    Bello, Auwal Ahmed
    Chiroma, Haruna
    Gital, Abdulsalam Ya'u
    Gabralla, Lubna A.
    Abdulhamid, Shafi'i M.
    Shuib, Liyana
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (17): : 13651 - 13678
  • [28] Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives
    Auwal Ahmed Bello
    Haruna Chiroma
    Abdulsalam Ya’u Gital
    Lubna A. Gabralla
    Shafi’i M. Abdulhamid
    Liyana Shuib
    Neural Computing and Applications, 2020, 32 : 13651 - 13678
  • [29] User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
    Saevanee, Hataichanok
    Hatarakosol, Pattarasince
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 82 - 86
  • [30] Security Analysis of Two Password Authentication Schemes
    Tan, Zuowen
    EIGHTH INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, PROCEEDINGS, 2009, : 62 - 62