Acceptance of subscriber authentication methods for mobile telephony devices

被引:28
|
作者
Clarke, NL [1 ]
Furnell, SM
Rodwell, PM
Reynolds, PL
机构
[1] Univ Plymouth, Dept Commun & Elect Engn, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Orange Personal Commun Serv Ltd, Bristol, Avon, England
关键词
D O I
10.1016/S0167-4048(02)00304-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorized use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilized and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 50 条
  • [21] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [22] Face recognition for authentication on mobile devices
    Vazquez-Fernandez, Esteban
    Gonzalez-Jimenez, Daniel
    IMAGE AND VISION COMPUTING, 2016, 55 : 31 - 33
  • [23] Content authentication in enterprises for mobile devices
    Kappes, M
    Krishnan, P
    2004 IEEE/SARNOFF SYMPOSIUM ON ADVANCES IN WIRED AND WIRELESS COMMUNICATION, 2004, : 127 - 129
  • [24] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [25] Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
    Hwang, Doo-Hee
    Shin, Jin-Myeong
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 694 - 696
  • [26] A Roadmap to Continuous Biometric Authentication on Mobile Devices
    Rybnicek, Marlies
    Lang-Muhr, Christoph
    Haslinger, Daniel
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 122 - 127
  • [27] Gait Recognition as an Authentication Method for Mobile Devices
    Axente, Matei-Sorin
    Dobre, Ciprian
    Ciobanu, Radu-Ioan
    Purnichescu-Purtan, Raluca
    SENSORS, 2020, 20 (15) : 1 - 17
  • [28] Facial attributes for active authentication on mobile devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    IMAGE AND VISION COMPUTING, 2017, 58 : 181 - 192
  • [29] Proximity-based authentication for mobile devices
    Jansen, W
    Gavrila, S
    Korolev, V
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 398 - 404
  • [30] Local authentication with Bluetooth enabled mobile devices
    Dellutri, F
    Me, GL
    Strangio, MA
    2005 JOINT INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS AND INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICAS/ICNS), 2005, : 447 - 452