Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years; however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication schemes exhibiting their security and usability issues.

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access / Gupta, Sandeep; Buriro, Attaullah; Crispo, Bruno. - In: MOBILE INFORMATION SYSTEMS. - ISSN 1574-017X. - 2018:(2018), pp. 2649598.1-2649598.16. [10.1155/2018/2649598]

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Gupta, Sandeep;Buriro, Attaullah;Crispo, Bruno
2018-01-01

Abstract

Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years; however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication schemes exhibiting their security and usability issues.
2018
Gupta, Sandeep; Buriro, Attaullah; Crispo, Bruno
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access / Gupta, Sandeep; Buriro, Attaullah; Crispo, Bruno. - In: MOBILE INFORMATION SYSTEMS. - ISSN 1574-017X. - 2018:(2018), pp. 2649598.1-2649598.16. [10.1155/2018/2649598]
File in questo prodotto:
File Dimensione Formato  
Journal - Demystifying Authentication Concepts in Smartphones Ways and Types to Secure Access.pdf

accesso aperto

Descrizione: Published Paper
Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Creative commons
Dimensione 3.21 MB
Formato Adobe PDF
3.21 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/212249
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 36
  • ???jsp.display-item.citation.isi??? 25
social impact