User Authentication Schemes for Mobile and Handheld Devices
نویسندگان
چکیده
User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users but this method has been shown to have considerable drawbacks. For example, users tend to pick PIN or passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem in handheld devices, some researchers have developed comparatively more secure, affordable and memorable authentication schemes based on graphical assistance, images and audio. In this paper, we conduct a comprehensive survey and analysis of such existing user authentication schemes for mobile and handheld devices. The complete analysis of these schemes in term of usability and security are also discussed in this paper. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to password based authentication schemes.
منابع مشابه
Proximity-Based Authentication for Mobile Devices
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two location-based user authentication mechanisms designed to take advantage of Bluetooth functionality built into many current handheld devices.
متن کاملAuthenticating Users on Handheld Devices
Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization’s influence. Yet, these devices are being used increasingly in corporate settings where they pose a security risk, not only by the sensitive information they may contain, but also the means to access such information they may provide. U...
متن کاملAbstract: While mobile handheld devices provide productivity benefits, they also pose new risks
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSmart Card Authentication for Mobile Devices
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.
متن کامل