Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.

Mobile biometrics: Towards a comprehensive evaluation methodology / Buriro, Attaullah; Akhtar, Zahid; Crispo, Bruno; Gupta, Sandeep. - (2017), pp. 1-6. (Intervento presentato al convegno ICCST 2017 tenutosi a Madrid nel 23th-26th October 2017) [10.1109/CCST.2017.8167859].

Mobile biometrics: Towards a comprehensive evaluation methodology

Attaullah Buriro;Bruno Crispo;Sandeep Gupta
2017-01-01

Abstract

Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.
2017
2017 International Carnahan Conference on Security Technology (ICCST) Proceedings
Piscataway, NJ
Institute of Electrical and Electronics Engineers (IEEE)
9781538615850
Buriro, Attaullah; Akhtar, Zahid; Crispo, Bruno; Gupta, Sandeep
Mobile biometrics: Towards a comprehensive evaluation methodology / Buriro, Attaullah; Akhtar, Zahid; Crispo, Bruno; Gupta, Sandeep. - (2017), pp. 1-6. (Intervento presentato al convegno ICCST 2017 tenutosi a Madrid nel 23th-26th October 2017) [10.1109/CCST.2017.8167859].
File in questo prodotto:
File Dimensione Formato  
crispo-mobile biometric.pdf

Solo gestori archivio

Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 238.38 kB
Formato Adobe PDF
238.38 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/200065
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 13
  • ???jsp.display-item.citation.isi??? 4
social impact