Acceptance of subscriber authentication methods for mobile telephony devices

被引:28
|
作者
Clarke, NL [1 ]
Furnell, SM
Rodwell, PM
Reynolds, PL
机构
[1] Univ Plymouth, Dept Commun & Elect Engn, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Orange Personal Commun Serv Ltd, Bristol, Avon, England
关键词
D O I
10.1016/S0167-4048(02)00304-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorized use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilized and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 50 条
  • [41] A survey on touch dynamics authentication in mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    COMPUTERS & SECURITY, 2016, 59 : 210 - 235
  • [42] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [43] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [44] Testing the subscriber loop in broadband-telephony applications
    Ashworth, D
    EDN, 2001, 46 (16) : 81 - 85
  • [45] Factors affecting the acceptance of mobile devices in the classroom
    Zhang, Jin
    Chang, Chunbo
    Zhou, Peng
    2015 INTERNATIONAL CONFERENCE OF EDUCATIONAL INNOVATION THROUGH TECHNOLOGY - EITT 2015, 2015, : 294 - 298
  • [46] LEVELS OF USE AND ACCEPTANCE OF MOBILE DEVICES IN THE CLASSROOM
    Fombona Cadavieco, Javier
    Rodil Perez, Francisco Javier
    PIXEL-BIT- REVISTA DE MEDIOS Y EDUCACION, 2018, (52): : 21 - 35
  • [47] Impact of Applications for Mobile Devices: An Acceptance Study
    Munoz Andrade, Estela Lizbeth
    Espinosa, Daniela Fernandez
    Gomez Reynoso, Juan Manuel
    Arevalo Mercado, Carlos Argelio
    AMCIS 2015 PROCEEDINGS, 2015,
  • [48] Design of Fuzzy Expert System for Evaluation of Contemporary User Authentication Methods Intended for Mobile Devices
    Korac, Dragon
    Simic, Dejan
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2017, 19 (04): : 93 - 100
  • [49] A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and their Application in Head Mounted Displays
    Olade, Ilesanmi
    Liang, Hai-Ning
    Fleming, Charles
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1997 - 2004
  • [50] Swipe Gesture based Continuous Authentication for Mobile Devices
    Mondal, Soumik
    Bours, Patrick
    2015 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2015, : 458 - 465