User authentication on mobile devices: Approaches, threats and trends

被引:58
|
作者
Wang, Chen [1 ,4 ]
Wang, Yan [2 ]
Chen, Yingying [1 ]
Liu, Hongbo [3 ]
Liu, Jian [1 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, WINLAB, Piscataway, NJ 08854 USA
[2] SUNY Binghamton, Comp Sci Dept, Binghamton, NY 13902 USA
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[4] Louisiana State Univ, Dept Comp Sci & Engn, Baton Rouge, LA 70803 USA
基金
美国国家科学基金会;
关键词
User authentication; Mobile device; Embedded sensor; Authentication attack; FACE RECOGNITION; BIOMETRIC AUTHENTICATION; ECG AUTHENTICATION; IRIS RECOGNITION; VERIFICATION; IDENTIFICATION; INFORMATION; PALMPRINT; SMARTPHONES; PASSWORDS;
D O I
10.1016/j.comnet.2020.107118
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have brought a great convenience to us these years, which allow the users to enjoy the anytime and anywhere various applications such as the online shopping, Internet banking, navigation and mobile media. While the users enjoy the convenience and flexibility of the "Go Mobile" trend, their sensitive private information (e.g., name and credit card number) on the mobile devices could be disclosed. An adversary could access the sensitive private information stored on the mobile device by unlocking the mobile devices. Moreover, the user's mobile services and applications are all exposed to security threats. For example, the adversary could utilize the user's mobile device to conduct non-permitted actions (e.g., making online transactions and installing malwares). The authentication on mobile devices plays a significant role to protect the user's sensitive information on mobile devices and prevent any non-permitted access to the mobile devices. This paper surveys the existing authentication methods on mobile devices. In particular, based on the basic authentication metrics (i.e., knowledge, ownership and biometrics) used in existing mobile authentication methods, we categorize them into four categories, including the knowledge-based authentication (e.g., passwords and lock patterns), physiological biometricbased authentication (e.g., fingerprint and iris), behavioral biometrics-based authentication (e.g., gait and hand gesture), and two/multi-factor authentication. We compare the usability and security level of the existing authentication approaches among these categories. Moreover, we review the existing attacks to these authentication approaches to reveal their vulnerabilities. The paper points out that the trend of the authentication on mobile devices would be the multi-factor authentication, which determines the user's identity using the integration (not the simple combination) of more than one authentication metrics. For example, the user's behavior biometrics (e.g., keystroke dynamics) could be extracted simultaneously when he/she inputs the knowledge-based secrets (e.g., PIN), which can provide the enhanced authentication as well as sparing the user's trouble to conduct multiple inputs for different authentication metrics. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [2] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [3] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [4] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [5] Using Mobile Devices for User Authentication
    Lach, Jacek
    COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [6] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [7] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [8] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [9] Evaluation system for user authentication methods on mobile devices
    Progonov, Dmytro
    Prokhorchuk, Veronika
    Oliynyk, Andriy
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 95 - 101
  • [10] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9