DocumentCode :
3750031
Title :
Transparent authentication systems for mobile device security: A review
Author :
Saud Alotaibi;Steven Furnell;Nathan Clarke
Author_Institution :
Centre for Security, Communications and Network Research, Plymouth University, Plymouth, UK
fYear :
2015
Firstpage :
406
Lastpage :
413
Abstract :
Sensitive data such as text messages, contact lists, and personal information are stored on mobile devices. This makes authentication of paramount importance. More security is needed on mobile devices since, after point-of-entry authentication, the user can perform almost all tasks without having to re-authenticate. For this reason, many authentication methods have been suggested to improve the security of mobile devices in a transparent and continuous manner, providing a basis for convenient and secure user re-authentication. This paper presents a comprehensive analysis and literature review on transparent authentication systems for mobile device security. This review indicates a need to investigate when to authenticate the mobile user by focusing on the sensitivity level of the application, and understanding whether a certain application may require a protection or not.
Keywords :
"Authentication","Mobile handsets","Sensors","Mobile communication","Performance evaluation","Fingerprint recognition"
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for
Type :
conf
DOI :
10.1109/ICITST.2015.7412131
Filename :
7412131
Link To Document :
بازگشت