Using Mobile Devices for User Authentication

被引:1
|
作者
Lach, Jacek [1 ]
机构
[1] Silesian Tech Univ, PL-44100 Gliwice, Poland
来源
COMPUTER NETWORKS | 2010年 / 79卷
关键词
security; user authentication; mobile devices;
D O I
10.1007/978-3-642-13861-4_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common methods of user authentication utilizes passwords. This technique is widely spread and well known. Its main drawback is that it stresses human memory to allow for successful authentication and still remains in the domain which is called weak authentication. This paper presents a solution to this problem by introducing a form of two factor authentication by utilization of smartphones. The idea of such system is presented as well as a sample implementation, called MOTH (an acronym for MObile auTHentication), which allows for user authentication. The discussion of the system's security and its limitations is also presented.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [1] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [2] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548
  • [3] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61
  • [4] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119
  • [5] User Authentication Method using Shaking Actions in Mobile Devices
    Lee, Tae Kyong
    Kim, Tae Guen
    Im, Eul Gyu
    2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 142 - 147
  • [6] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [7] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [8] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [9] Strengthen user authentication on mobile devices by using user's touch dynamics pattern
    Teh, Pin Shen
    Zhang, Ning
    Tan, Syh-Yuan
    Shi, Qi
    Khoh, Wee How
    Nawaz, Raheel
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (10) : 4019 - 4039
  • [10] Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
    Pin Shen Teh
    Ning Zhang
    Syh-Yuan Tan
    Qi Shi
    Wee How Khoh
    Raheel Nawaz
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4019 - 4039