Abstract
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for example, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized access. The current operating systems of mobile smart phones offer different authentication mechanisms. Nonetheless, in some situations, these mechanisms are vulnerable and in other situations, they are not user friendly enough, thus not widely adopted. In this chapter, we will give an overview of the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment. In addition, the pro and cons of these techniques will be highlighted. Moreover, a comparison among these techniques will be conducted. The chapter also discuss the other techniques which could much suitable for the current environment of the mobile applications. Furthermore, it discuss a number of open issues of the mobile authentication which needs further research in the future to improve the adoption of the biometric authentication in the smartphones environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The iris is the annular part of the eye bounded by the sclera and the pupil.
References
Tseng, D., Mudanyali, O., Oztoprak, C., Isikman, S.O., Sencan, I., Yaglidere, O., Ozcan, A.: Lensfree microscopy on a cellphone. Lab Chip 10(14), 1787–1792 (2010)
Wang, H., Liu, J.: Mobile phone based health care technology. Recent Pat. Biomed. Eng. 2(1), 15–21 (2009)
Fudong, L., Nathan, C., Maria, P., Paul, D.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies (EST), 2010, IEEE (2010), pp. 77–82
Vaclav, M.J., Zdenek, R.: Toward reliable user authentication through biometrics. IEEE Secur. Priv. 1(3), 45–49 (2003)
Hanul, S., Niklas, K., Sebastian, M.: Poster: user preferences for biometric authentication methods and graded security on mobile phones. In: Symposium on Usability, Privacy, and Security (SOUPS) (2010)
Wazir, Z.K., Mohammed, Y.A., Yang, X.: A graphical password based system for small mobile devices. arXiv preprint arXiv:1110.3844 (2011)
Nathan, L.C., Steven, M.F.: Authentication of users on mobile telephones-a survey of attitudes and practices. Comput. Secur. 24(7), 519–527 (2005)
Mohsen, T., Ali, A.B.: Solutions to the gsm security weaknesses. In: The Second International Conference on Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST’08, IEEE (2008), pp. 576–581 (2008)
Qian, T., Raymond, V.: Biometric authentication system on mobile personal devices. IEEE Trans. Instrum. Meas. 59(4), 763–773 (2010)
Andrea, K., Valerie, S., Michael, S.: Using publicly known passwords with haptics and biometrics user verification. In: IEEE Haptics Symposium (HAPTICS) 2012, IEEE (2012), pp. 559–562 (2012)
Greg, E.B.: Graphical password (September 24 1996) US Patent 5,559,961
Haichang, G., Zhongjie, R., Xiuling, C., Xiyang, L., Uwe, A.: A new graphical password scheme resistant to shoulder-surfing. In: International Conference on Cyberworlds (CW) 2010, IEEE (2010), pp. 194–199 (2010)
Lawrence, O.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
Fadi, A., Syed, Z., Wassim, E.H.: Two factor authentication using mobile phones. In: IEEE/ACS International Conference on Computer Systems and Applications, 2009 (AICCSA 2009) IEEE (2009), pp. 641–644 (2009)
Parekh, T., Gawshinde, S., Sharma, M.K.: Token based authentication using mobile phone. In: International Conference on Communication Systems and Network Technologies (CSNT) 2011, IEEE (2011), pp. 85–88 (2011)
Clarke, N.L., Furnell, S.: Advanced user authentication for mobile devices. Comput. Secur. 26(2), 109–119 (2007)
Fred, C.: A secure mobile otp token. In: International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp. 3–16. Springer (2010)
Mohamed, H.E., Muhammad, K.K., Khaled, A., Tai-Hoon, K., Hassan, E.: Mobile one-time passwords: two-factor authentication using mobile phones. Secur. Commun. Netw. 5(5), 508–516 (2012)
Salil, P., Sharath, P., Anil, K.J.: Biometric recognition: security and privacy concerns. IEEE Secur. Priv. 1(2), 33–42 (2003)
Mohammad, O.D., Claudia, N., Patrick, B., Christoph, B.: Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) 2010, IEEE (2010), pp. 306–311 (2010)
Anil, K.J., Arun, R., Salil, P.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
Arun, R., Anil, J.: Biometric sensor interoperability: a case study in fingerprints. In: Proceedings of International ECCV Workshop on Biometric Authentication. Springer, pp. 134–145 (2004)
Anil, K.J., Patrick, F., Arun, A.R.: Handbook of Biometrics. Springer, New york (2007)
Pim, T., Anton, H.M.A., Tom, A.M.K., Geert-Jan, S., Asker, M.B., Raymond, N.J.V.: Practical biometric authentication with template protection. In: Audio-and Video-Based Biometric Person Authentication, pp. 436–446. Springer (2005)
Kresimir, D., Mislav, G.: A survey of biometric recognition methods. In: 46th International Symposium Electronics in Marine, 2004. Proceedings Elmar 2004, IEEE (2004), pp. 184–193
Patrick, G., Elham, T.: Performance of biometric quality measures. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 531–543 (2007)
Vibha, K.R.: Integration of biometric authentication procedure in customer oriented payment system in trusted mobile devices. Int. J. Inf. Technol. 1(6), 15–25 (2012). doi:10.5121/ijitcs.2011.1602
Jakobsson, M., Shi, E., Golle, P., Chow, R.: Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX conference on Hot topics in security, USENIX Association, pp. 9–9 (2009)
Umut, U., Sharath, P., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
Muhammad, K.K., Jiashu, Z., Xiaomin, W.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3), 519–524 (2008)
Jakobsson, M.: Mobile Authentication: Problems and Solutions. Springer Publishing Company, Incorporated, New York (2013)
Yooyoung, L., Phillips, P.J., Ross, J.M.: An automated video-based system for iris recognition. In: Tistarelli, M., Nixon, M.S. (eds.) Advances in Biometrics, pp. 1160–1169. Springer, Berlin (2009)
Park, K.R., Park, H.A., Kang, B.J., Lee, E.C., Jeong, D.S.: A study on iris localization and recognition on mobile phones. EURASIP J. Adv. Signal Process 2008, Article ID 281943 (2008). doi:10.1155/2008/281943
Hamed, N., Ghada, E.T., Eman, M.: A novel feature extraction scheme for human gait recognition. Int. J. Image Graph. 10(04), 575–587 (2010)
Dacheng, T., Xuelong, L., Xindong, W., Stephen, J.M.: General tensor discriminant analysis and gabor features for gait recognition. IEEE Trans. Pattern Anal. Mach. Intell. 29(10), 1700–1715 (2007)
Oriana, R., Chuan, Q., Karin, S., Dimitrios, L.: Progressive authentication: deciding when to authenticate on mobile phones. In: Proceedings of the 21st USENIX Security Symposium (2012)
Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)
Carlo, T., Abbas, R., Ilhami, T.: Full-size projection keyboard for handheld devices. Commun. ACM 46(7), 70–75 (2003)
Ting-Yi, C., Cheng-Jung, T., Jyun-Hao, L.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157–1165 (2012)
Sevasti, K., Nathan, C.: Keystroke analysis for thumb-based keyboards on mobile devices. In: New Approaches for Security, Privacy and Trust in Complex Environments, pp. 253–263. Springer (2007)
Simon, L., Mark, S.: A practical guide to biometric security technology. IT Prof. 3(1), 27–32 (2001)
Marcos, M.D., Julian, F., Javier, G., Javier, O.G.: Towards mobile authentication using dynamic signature verification: useful features and performance evaluation. In: 19th International Conference on Pattern Recognition, 2008. ICPR 2008, IEEE (2008), pp. 1–5
Ram, P.K., Julian, F., Javier, G., Marcos, M.D.: Dynamic signature verification on smart phones. In: Highlights on Practical Applications of Agents and Multi-Agent Systems, pp. 213–222. Springer (2013)
Anil, K.J., Friederike, D.G., Scott, D.C.: On-line signature verification. Pattern Recognit. 35(12), 2963–2972 (2002)
Roman, V.Y., Venu, G.: Behavioural biometrics: a survey and classification. Int. J. Biometrics 1(1), 81–113 (2008)
Kai, X., Jiankun, H.: Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In: IEEE International Conference on Communications, 2009. ICC’09, IEEE (2009), pp. 1–5
Rene, M., Thomas, K.: Towards usable authentication on mobile phones: an evaluation of speaker and face recognition on off-the-shelf handsets. In: Fourth International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), Newcastle, UK (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Amin, R., Gaber, T., ElTaweel, G., Hassanien, A.E. (2014). Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)