Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

被引:0
作者
Ferrag, Mohamed Amine [1 ,5 ]
Maglaras, Leandros [2 ,3 ]
Derhab, Abdelouahid [4 ]
Korba, Abdelaziz Amara [5 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Gen Secretariat Digital Policy, Athens, Greece
[4] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[5] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba 23000, Algeria
来源
2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS) | 2018年
关键词
Security; Authentication; Mobile Computing Devices; Biometrics; USER AUTHENTICATION; ECG AUTHENTICATION; RECOGNITION; IRIS; NETWORKS; FEATURES; SYSTEM; FACE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we provide a comprehensive review of state-of-the-art results for biometric-based authentication schemes in mobile computing devices. We select and examine twenty biometric-based authentication schemes developed for mobile computing devices. We discuss current issues that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). Threat models and countermeasures used by biometrics-based authentication schemes for mobile computing devices are also presented. Throughout, we identify the pitfalls and limitations of the existing biometric-based authentication schemes for mobile computing devices. Based on the current taxonomy, we discuss the research problems and outline directions for future research efforts in biometrics-based authentication schemes for mobile devices.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 58 条
[1]   ESSPR: an efficient secure routing scheme based on searchable encryption with vehicle proxy re-encryption for vehicular peer-to-peer social network [J].
Amine Ferrag, Mohamed ;
Ahmim, Ahmed .
TELECOMMUNICATION SYSTEMS, 2017, 66 (03) :481-503
[2]  
[Anonymous], FUTUR GENER COMPUT S
[3]  
[Anonymous], P 2018 IEEE INT C CO, DOI DOI 10.1109/ICCE.2018.8326219
[4]  
[Anonymous], INT J COMMUNICATION
[5]  
[Anonymous], 2017, P INT C INF COMM TEC
[6]  
[Anonymous], 2017, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, DOI 10.4108/eai.1-2-2017.152155
[7]  
[Anonymous], 2013, INT J EMBED REAL TIM
[8]   ECG Authentication for Mobile Devices [J].
Arteaga-Falconi, Juan Sebastian ;
Al Osman, Hussein ;
El Saddik, Abdulmotaleb .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2016, 65 (03) :591-600
[9]   A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices [J].
Chang, Ting-Yi ;
Tsai, Cheng-Jung ;
Lin, Jyun-Hao .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (05) :1157-1165
[10]   Mobile device integration of a fingerprint biometric remote authentication scheme [J].
Chen, Chin-Ling ;
Lee, Cheng-Chi ;
Hsu, Chao-Yung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) :585-597