Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ International Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
https://dx.doi.org/10.60692/s4...
Other literature type . 2017
Data sources: Datacite
https://dx.doi.org/10.60692/7d...
Other literature type . 2017
Data sources: Datacite
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

تقنيات المصادقة الحديثة في الهواتف الذكية: منظور الأمن وسهولة الاستخدام
Authors: Usman Shafique; Hikmat Ullah Khan; Sabah-ud-din Waqar; Arshad Sher; Adnan Zeb; Uferah Shafi; Rahim Ullah; +1 Authors

Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

Abstract

Un smartphone a une capacité informatique et une connectivité plus avancées que les téléphones de base. Actuellement, nous passons de la société Internet à une société mobile où l'accès à l'information est de plus en plus nécessaire. Il en a résulté une sécurité mobile qui n'est plus immanente, mais impérative. L'authentification des smartphones a reçu une attention considérable de la part de la communauté des chercheurs au cours des dernières années, car il y a eu des développements modernes au-delà des codes pin et des mots de passe classiques, ce qui rend l'authentification des utilisateurs plus difficile. Dans cet article, nous analysons de manière critique les attaques et les vulnérabilités des mécanismes d'authentification des smartphones. Une analyse comparative des différentes techniques d'authentification ainsi que de l'utilisation des différentes méthodes d'authentification est discutée, ce qui conduit l'utilisateur final à choisir la technique d'authentification la plus appropriée et la plus personnalisable.

Un teléfono inteligente tiene una capacidad informática y conectividad más avanzadas que los teléfonos con funciones básicas. En la actualidad, estamos pasando de la sociedad de Internet a una sociedad móvil donde se requiere cada vez más acceso a la información. Esto ha dado como resultado una seguridad móvil que ya no es inmanente, sino imperativa. La autenticación de teléfonos inteligentes ha recibido una atención sustancial de la comunidad de investigación durante los últimos años porque ha habido desarrollos modernos más allá de los PIN y contraseñas clásicos que hacen que la autenticación del usuario sea más desafiante. En este artículo, analizamos críticamente los ataques y las vulnerabilidades en los mecanismos de autenticación de los teléfonos inteligentes. Se discute un análisis comparativo de las diferentes técnicas de autenticación junto con el uso de los diferentes métodos de autenticación que llevan al usuario final a elegir la técnica de autenticación más adecuada y personalizable.

A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones' authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.

يتمتع الهاتف الذكي بقدرة حوسبة واتصال أكثر تقدمًا من الهواتف المميزة الأساسية. في الوقت الحاضر، نحن ننتقل من مجتمع الإنترنت إلى مجتمع متنقل حيث يتطلب الأمر المزيد والمزيد من الوصول إلى المعلومات. وقد أدى ذلك إلى أمن متنقل لم يعد جوهريًا، بل حتميًا. حظيت مصادقة الهاتف الذكي باهتمام كبير من المجتمع البحثي على مدى السنوات القليلة الماضية نظرًا لوجود تطورات حديثة تتجاوز أرقام التعريف الشخصية وكلمات المرور الكلاسيكية مما يجعل مصادقة المستخدم أكثر صعوبة. في هذه الورقة، نقوم بتحليل نقدي للهجمات ونقاط الضعف في آليات مصادقة الهواتف الذكية. تتم مناقشة تحليل مقارن لتقنيات المصادقة المختلفة إلى جانب استخدام طرق المصادقة المختلفة التي تقود المستخدم النهائي نحو اختيار تقنية المصادقة الأكثر ملاءمة وقابلية للتخصيص.

Related Organizations
Keywords

FOS: Computer and information sciences, Artificial intelligence, User Authentication Methods and Security Measures, Usability, Perspective (graphical), Detection and Prevention of Phishing Attacks, Password, Characterization and Detection of Android Malware, Computer security, Lightweight Extensible Authentication Protocol, Authentication, Human–computer interaction, Chip Authentication Program, Computer science, Challenge-Handshake Authentication Protocol, World Wide Web, Authentication (law), Computer Science, Physical Sciences, Signal Processing, Security Analysis, Internet privacy, Authentication protocol, Multi-factor authentication, Information Systems

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    5
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
5
Average
Average
Average
gold