Acceptance of subscriber authentication methods for mobile telephony devices

被引:28
|
作者
Clarke, NL [1 ]
Furnell, SM
Rodwell, PM
Reynolds, PL
机构
[1] Univ Plymouth, Dept Commun & Elect Engn, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Orange Personal Commun Serv Ltd, Bristol, Avon, England
关键词
D O I
10.1016/S0167-4048(02)00304-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorized use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilized and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 50 条
  • [31] Biometric Authentication System on Mobile Personal Devices
    Tao, Qian
    Veldhuis, Raymond
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (04) : 763 - 773
  • [32] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [33] Ensuring Secured Iris Authentication for Mobile Devices
    Choudhary, Meenakshi
    Tiwari, Vivek
    Venkanna, U.
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [34] Proximity-based authentication of mobile devices
    Scannell, Adin
    Varshavsky, Alexander
    LaMarca, Anthony
    de Lara, Eyal
    International Journal of Security and Networks, 2009, 4 (1-2) : 4 - 16
  • [35] Who wants Continuous Authentication on Mobile Devices?
    Rasnayaka, Sanka
    Sim, Terence
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [36] A Flick Biometric Authentication Mechanism on Mobile Devices
    Shih, Dong-Her
    Lu, Chia-Ming
    Shih, Ming-Hung
    2015 INTERNATIONAL CONFERENCE ON INFORMATIVE AND CYBERNETICS FOR COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2015, : 31 - 33
  • [37] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [38] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [39] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314
  • [40] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046