User Authentication for Mobile Devices

被引:0
|
作者
Rogowski, Marcin [1 ]
Saeed, Khalid [2 ]
Rybnik, Mariusz [3 ]
Tabedzki, Marek [4 ]
Adamski, Marcin [4 ]
机构
[1] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
[2] AGH Univ Sci & Technol, Fac Phys & Appl Comp Sci, Krakow, Poland
[3] Univ Bialystok, Bialystok, Poland
[4] Bialystok Tech Univ, Fac Comp Sci, Bialystok, Poland
关键词
user authentication; biometrics; mobile devices; touchscreen;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper is intended as a short review of user authentication problem for mobile devices. The emphasis is put on smartphones and tablets, that nowadays are very similar to miniaturized personal computers with much more sensors of various origin. The sensors are described with remarks on their usefulness for user authentication. Deficiencies of traditional user authentication methods based on knowledge are pointed out and the need for new - more secure but also comfortable - user authentication mechanisms is reasoned. Preliminary user authentication systems employing biometric features are discussed and hence the generally unused potential of biometrics for mobile devices is demonstrated.
引用
收藏
页码:47 / 58
页数:12
相关论文
共 50 条
  • [1] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [2] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [3] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [4] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [5] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [6] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [7] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [8] Towards Multiple User Active Authentication in Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    [J]. 2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 354 - 361
  • [9] User authentication on mobile devices: Approaches, threats and trends
    Wang, Chen
    Wang, Yan
    Chen, Yingying
    Liu, Hongbo
    Liu, Jian
    [J]. COMPUTER NETWORKS, 2020, 170 (170)
  • [10] Evaluation system for user authentication methods on mobile devices
    Progonov, Dmytro
    Prokhorchuk, Veronika
    Oliynyk, Andriy
    [J]. 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 95 - 101