Skip to main content

Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues

  • Chapter
  • First Online:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

Abstract

Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for example, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized access. The current operating systems of mobile smart phones offer different authentication mechanisms. Nonetheless, in some situations, these mechanisms are vulnerable and in other situations, they are not user friendly enough, thus not widely adopted. In this chapter, we will give an overview of the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment. In addition, the pro and cons of these techniques will be highlighted. Moreover, a comparison among these techniques will be conducted. The chapter also discuss the other techniques which could much suitable for the current environment of the mobile applications. Furthermore, it discuss a number of open issues of the mobile authentication which needs further research in the future to improve the adoption of the biometric authentication in the smartphones environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The iris is the annular part of the eye bounded by the sclera and the pupil.

References

  1. Tseng, D., Mudanyali, O., Oztoprak, C., Isikman, S.O., Sencan, I., Yaglidere, O., Ozcan, A.: Lensfree microscopy on a cellphone. Lab Chip 10(14), 1787–1792 (2010)

    Article  Google Scholar 

  2. Wang, H., Liu, J.: Mobile phone based health care technology. Recent Pat. Biomed. Eng. 2(1), 15–21 (2009)

    Article  Google Scholar 

  3. Fudong, L., Nathan, C., Maria, P., Paul, D.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies (EST), 2010, IEEE (2010), pp. 77–82

    Google Scholar 

  4. Vaclav, M.J., Zdenek, R.: Toward reliable user authentication through biometrics. IEEE Secur. Priv. 1(3), 45–49 (2003)

    Article  Google Scholar 

  5. Hanul, S., Niklas, K., Sebastian, M.: Poster: user preferences for biometric authentication methods and graded security on mobile phones. In: Symposium on Usability, Privacy, and Security (SOUPS) (2010)

    Google Scholar 

  6. Wazir, Z.K., Mohammed, Y.A., Yang, X.: A graphical password based system for small mobile devices. arXiv preprint arXiv:1110.3844 (2011)

  7. Nathan, L.C., Steven, M.F.: Authentication of users on mobile telephones-a survey of attitudes and practices. Comput. Secur. 24(7), 519–527 (2005)

    Article  Google Scholar 

  8. Mohsen, T., Ali, A.B.: Solutions to the gsm security weaknesses. In: The Second International Conference on Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST’08, IEEE (2008), pp. 576–581 (2008)

    Google Scholar 

  9. Qian, T., Raymond, V.: Biometric authentication system on mobile personal devices. IEEE Trans. Instrum. Meas. 59(4), 763–773 (2010)

    Article  Google Scholar 

  10. Andrea, K., Valerie, S., Michael, S.: Using publicly known passwords with haptics and biometrics user verification. In: IEEE Haptics Symposium (HAPTICS) 2012, IEEE (2012), pp. 559–562 (2012)

    Google Scholar 

  11. Greg, E.B.: Graphical password (September 24 1996) US Patent 5,559,961

    Google Scholar 

  12. Haichang, G., Zhongjie, R., Xiuling, C., Xiyang, L., Uwe, A.: A new graphical password scheme resistant to shoulder-surfing. In: International Conference on Cyberworlds (CW) 2010, IEEE (2010), pp. 194–199 (2010)

    Google Scholar 

  13. Lawrence, O.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)

    Article  Google Scholar 

  14. Fadi, A., Syed, Z., Wassim, E.H.: Two factor authentication using mobile phones. In: IEEE/ACS International Conference on Computer Systems and Applications, 2009 (AICCSA 2009) IEEE (2009), pp. 641–644 (2009)

    Google Scholar 

  15. Parekh, T., Gawshinde, S., Sharma, M.K.: Token based authentication using mobile phone. In: International Conference on Communication Systems and Network Technologies (CSNT) 2011, IEEE (2011), pp. 85–88 (2011)

    Google Scholar 

  16. Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)

    Article  Google Scholar 

  17. Fred, C.: A secure mobile otp token. In: International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp. 3–16. Springer (2010)

    Google Scholar 

  18. Mohamed, H.E., Muhammad, K.K., Khaled, A., Tai-Hoon, K., Hassan, E.: Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Netw. 5(5), 508–516 (2012)

    Google Scholar 

  19. Salil, P., Sharath, P., Anil, K.J.: Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 1(2), 33–42 (2003)

    Article  Google Scholar 

  20. Mohammad, O.D., Claudia, N., Patrick, B., Christoph, B.: Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) 2010, IEEE (2010), pp. 306–311 (2010)

    Google Scholar 

  21. Anil, K.J., Arun, R., Salil, P.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)

    Google Scholar 

  22. Arun, R., Anil, J.: Biometric sensor interoperability: a case study in fingerprints. In: Proceedings of International ECCV Workshop on Biometric Authentication. Springer, pp. 134–145 (2004)

    Google Scholar 

  23. Anil, K.J., Patrick, F., Arun, A.R.: Handbook of Biometrics. Springer, New york (2007)

    Google Scholar 

  24. Pim, T., Anton, H.M.A., Tom, A.M.K., Geert-Jan, S., Asker, M.B., Raymond, N.J.V.: Practical biometric authentication with template protection. In: Audio-and Video-Based Biometric Person Authentication, pp. 436–446. Springer (2005)

    Google Scholar 

  25. Kresimir, D., Mislav, G.: A survey of biometric recognition methods. In: 46th International Symposium Electronics in Marine, 2004. Proceedings Elmar 2004, IEEE (2004), pp. 184–193

    Google Scholar 

  26. Patrick, G., Elham, T.: Performance of biometric quality measures. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 531–543 (2007)

    Article  Google Scholar 

  27. Vibha, K.R.: Integration of biometric authentication procedure in customer oriented payment system in trusted mobile devices. Int. J. Inf. Technol. 1(6), 15–25 (2012). doi:10.5121/ijitcs.2011.1602

  28. Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX conference on Hot topics in security, USENIX Association, pp. 9–9 (2009)

    Google Scholar 

  29. Umut, U., Sharath, P., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  30. Muhammad, K.K., Jiashu, Z., Xiaomin, W.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3), 519–524 (2008)

    Article  Google Scholar 

  31. Jakobsson, M.: Mobile Authentication: Problems and Solutions. Springer Publishing Company, Incorporated, New York (2013)

    Book  Google Scholar 

  32. Yooyoung, L., Phillips, P.J., Ross, J.M.: An automated video-based system for iris recognition. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 1160–1169. Springer, Berlin (2009)

    Google Scholar 

  33. Park, K.R., Park, H.A., Kang, B.J., Lee, E.C., Jeong, D.S.: A study on iris localization and recognition on mobile phones. EURASIP J. Adv. Signal Process 2008, Article ID 281943 (2008). doi:10.1155/2008/281943

  34. Hamed, N., Ghada, E.T., Eman, M.: A novel feature extraction scheme for human gait recognition. Int. J. Image Graph. 10(04), 575–587 (2010)

    Article  MathSciNet  Google Scholar 

  35. Dacheng, T., Xuelong, L., Xindong, W., Stephen, J.M.: General tensor discriminant analysis and gabor features for gait recognition. IEEE Trans. Pattern Anal. Mach. Intell. 29(10), 1700–1715 (2007)

    Article  Google Scholar 

  36. Oriana, R., Chuan, Q., Karin, S., Dimitrios, L.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21st USENIX Security Symposium (2012)

    Google Scholar 

  37. Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)

  38. Carlo, T., Abbas, R., Ilhami, T.: Full-size projection keyboard for handheld devices. Commun. ACM 46(7), 70–75 (2003)

    Article  Google Scholar 

  39. Ting-Yi, C., Cheng-Jung, T., Jyun-Hao, L.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)

    Article  Google Scholar 

  40. Sevasti, K., Nathan, C.: Keystroke analysis for thumb-based keyboards on mobile devices. In: New Approaches for Security, Privacy and Trust in Complex Environments, pp. 253–263. Springer (2007)

    Google Scholar 

  41. Simon, L., Mark, S.: A practical guide to biometric security technology. IT Prof. 3(1), 27–32 (2001)

    Article  Google Scholar 

  42. Marcos, M.D., Julian, F., Javier, G., Javier, O.G.: Towards mobile authentication using dynamic signature verification: useful features and performance evaluation. In: 19th International Conference on Pattern Recognition, 2008. ICPR 2008, IEEE (2008), pp. 1–5

    Google Scholar 

  43. Ram, P.K., Julian, F., Javier, G., Marcos, M.D.: Dynamic signature verification on smart phones. In: Highlights on Practical Applications of Agents and Multi-Agent Systems, pp. 213–222. Springer (2013)

    Google Scholar 

  44. Anil, K.J., Friederike, D.G., Scott, D.C.: On-line signature verification. Pattern Recognit. 35(12), 2963–2972 (2002)

    Article  MATH  Google Scholar 

  45. Roman, V.Y., Venu, G.: Behavioural biometrics: a survey and classification. Int. J. Biometrics 1(1), 81–113 (2008)

    Article  Google Scholar 

  46. Kai, X., Jiankun, H.: Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In: IEEE International Conference on Communications, 2009. ICC’09, IEEE (2009), pp. 1–5

    Google Scholar 

  47. Rene, M., Thomas, K.: Towards usable authentication on mobile phones: an evaluation of speaker and face recognition on off-the-shelf handsets. In: Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), Newcastle, UK (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek Gaber .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Amin, R., Gaber, T., ElTaweel, G., Hassanien, A.E. (2014). Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics