Acceptance of subscriber authentication methods for mobile telephony devices

被引:28
|
作者
Clarke, NL [1 ]
Furnell, SM
Rodwell, PM
Reynolds, PL
机构
[1] Univ Plymouth, Dept Commun & Elect Engn, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Orange Personal Commun Serv Ltd, Bristol, Avon, England
关键词
D O I
10.1016/S0167-4048(02)00304-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorized use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilized and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 50 条
  • [1] Efficiency of Paid Authentication Methods for Mobile Devices
    Jeong Yeon Kim
    Wireless Personal Communications, 2017, 93 : 543 - 551
  • [2] Efficiency of Paid Authentication Methods for Mobile Devices
    Kim, Jeong Yeon
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 543 - 551
  • [3] WiMAX Subscriber and Mobile Station Authentication Challenges
    Jacobs, Stuart
    IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) : 166 - 172
  • [4] Evaluation system for user authentication methods on mobile devices
    Progonov, Dmytro
    Prokhorchuk, Veronika
    Oliynyk, Andriy
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 95 - 101
  • [5] Determinants of subscriber churn and customer loyalty in the Korean mobile telephony market
    Kim, HS
    Yoon, CH
    TELECOMMUNICATIONS POLICY, 2004, 28 (9-10) : 751 - 765
  • [6] READINESS FACTORS AND CONSUMER ACCEPTANCE OF TECHNOLOGY IN MOBILE TELEPHONY
    Sousa Cunha, Lucilla Andrade
    da Silva, Jussara Goulart
    Pereira do Prado, Rejane Alexandrina Domingues
    da Silva, Marli Auxiliadora
    INTERNATIONAL JOURNAL OF INNOVATION, 2014, 2 (01): : 77 - 91
  • [7] Advanced subscriber authentication approaches for third generation mobile systems
    Clarke, NL
    Furnell, SM
    Reynolds, PL
    Rodwell, PM
    THIRD INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2002, (489): : 319 - 323
  • [8] Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets
    Clarke, NL
    Furnell, SM
    Lines, BM
    Reynolds, PL
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 97 - 108
  • [9] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [10] ECG Authentication for Mobile Devices
    Arteaga-Falconi, Juan Sebastian
    Al Osman, Hussein
    El Saddik, Abdulmotaleb
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2016, 65 (03) : 591 - 600