Weizhi Meng
Surveying the development of biometric user authentication on mobile phones
Meng, Weizhi; Wong, Duncan S.; Furnell, Steven; Zhou, Jianying
Authors
Duncan S. Wong
STEVEN FURNELL STEVEN.FURNELL@NOTTINGHAM.AC.UK
Professor of Cyber Security
Jianying Zhou
Abstract
© 1998-2012 IEEE. Designing reliable user authentication on mobile phones is becoming an increasingly important task to protect users' private information and data. Since biometric approaches can provide many advantages over the traditional authentication methods, they have become a significant topic for both academia and industry. The major goal of biometric user authentication is to authenticate legitimate users and identify impostors based on physiological and behavioral characteristics. In this paper, we survey the development of existing biometric authentication techniques on mobile phones, particularly on touch-enabled devices, with reference to 11 biometric approaches (five physiological and six behavioral). We present a taxonomy of existing efforts regarding biometric authentication on mobile phones and analyze their feasibility of deployment on touch-enabled mobile phones. In addition, we systematically characterize a generic biometric authentication system with eight potential attack points and survey practical attacks and potential countermeasures on mobile phones. Moreover, we propose a framework for establishing a reliable authentication mechanism through implementing a multimodal biometric user authentication in an appropriate way. Experimental results are presented to validate this framework using touch dynamics, and the results show that multimodal biometrics can be deployed on touch-enabled phones to significantly reduce the false rates of a single biometric system. Finally, we identify challenges and open problems in this area and suggest that touch dynamics will become a mainstream aspect in designing future user authentication on mobile phones.
Citation
Meng, W., Wong, D. S., Furnell, S., & Zhou, J. (2015). Surveying the development of biometric user authentication on mobile phones. Communications Surveys and Tutorials, IEEE Communications Society, 17(3), 1268-1293. https://doi.org/10.1109/COMST.2014.2386915
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 31, 2014 |
Online Publication Date | Dec 31, 2014 |
Publication Date | Jul 1, 2015 |
Deposit Date | Sep 12, 2020 |
Journal | IEEE Communications Surveys and Tutorials |
Electronic ISSN | 1553-877X |
Publisher | Institute of Electrical and Electronics Engineers |
Peer Reviewed | Peer Reviewed |
Volume | 17 |
Issue | 3 |
Pages | 1268-1293 |
DOI | https://doi.org/10.1109/COMST.2014.2386915 |
Public URL | https://nottingham-repository.worktribe.com/output/4868316 |
Publisher URL | https://ieeexplore.ieee.org/document/7000543 |
You might also like
Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing
(2023)
Conference Proceeding
Evaluation of Contextual and Game-Based Training for Phishing Detection
(2022)
Journal Article
Accessible authentication: Assessing the applicability for users with disabilities
(2021)
Journal Article
Developing a cyber security culture: Current practices and future needs
(2021)
Journal Article
An empirical analysis of the information security culture key factors framework
(2021)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: digital-library-support@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search