Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
|
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [1] Efficiency of Paid Authentication Methods for Mobile Devices
    Kim, Jeong Yeon
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 543 - 551
  • [2] Evaluation system for user authentication methods on mobile devices
    Progonov, Dmytro
    Prokhorchuk, Veronika
    Oliynyk, Andriy
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 95 - 101
  • [3] Acceptance of subscriber authentication methods for mobile telephony devices
    Clarke, NL
    Furnell, SM
    Rodwell, PM
    Reynolds, PL
    COMPUTERS & SECURITY, 2002, 21 (03) : 220 - 228
  • [4] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [5] ECG Authentication for Mobile Devices
    Arteaga-Falconi, Juan Sebastian
    Al Osman, Hussein
    El Saddik, Abdulmotaleb
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2016, 65 (03) : 591 - 600
  • [6] Banknote Authentication with Mobile Devices
    Lohweg, Volker
    Hoffmann, Jan Leif
    Doerksen, Helene
    Hildebrand, Roland
    Gillich, Eugen
    Hofmann, Juerg
    Schaede, Johannes
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013, 8665
  • [7] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [8] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95
  • [9] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [10] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61