Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

被引:0
作者
Ferrag, Mohamed Amine [1 ,5 ]
Maglaras, Leandros [2 ,3 ]
Derhab, Abdelouahid [4 ]
Korba, Abdelaziz Amara [5 ]
机构
[1] Guelma Univ, Dept Comp Sci, Guelma 24000, Algeria
[2] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[3] Gen Secretariat Digital Policy, Athens, Greece
[4] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[5] Badji Mokhtar Annaba Univ, Networks & Syst Lab LRS, Annaba 23000, Algeria
来源
2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS) | 2018年
关键词
Security; Authentication; Mobile Computing Devices; Biometrics; USER AUTHENTICATION; ECG AUTHENTICATION; RECOGNITION; IRIS; NETWORKS; FEATURES; SYSTEM; FACE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we provide a comprehensive review of state-of-the-art results for biometric-based authentication schemes in mobile computing devices. We select and examine twenty biometric-based authentication schemes developed for mobile computing devices. We discuss current issues that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). Threat models and countermeasures used by biometrics-based authentication schemes for mobile computing devices are also presented. Throughout, we identify the pitfalls and limitations of the existing biometric-based authentication schemes for mobile computing devices. Based on the current taxonomy, we discuss the research problems and outline directions for future research efforts in biometrics-based authentication schemes for mobile devices.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 50 条
  • [21] Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Derhab, Abdelouahid
    Janicke, Helge
    TELECOMMUNICATION SYSTEMS, 2020, 73 (02) : 317 - 348
  • [22] Contextual Biometric-Based Authentication for Ubiquitous Services
    Buhan, Ileana
    Lenzini, Gabriele
    Radomirovic, Sasa
    UBIQUITOUS INTELLIGENCE AND COMPUTING, 2010, 6406 : 680 - +
  • [23] Multimodal Biometric-Based Authentication with Secured Templates
    Choudhary, Swati K.
    Naik, Ameya K.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2021, 21 (02)
  • [24] A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN
    Sarvabhatla, Mrudula
    Vorugunti, Chandra Sekhar
    2014 FOURTH INTERNATIONAL CONFERENCE OF EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2014, : 367 - 372
  • [25] Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards
    Fengtong Wen
    Willy Susilo
    Guomin Yang
    Wireless Personal Communications, 2015, 80 : 1747 - 1760
  • [26] On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
    Morteza Adeli
    Nasour Bagheri
    Hamid Reza Meimani
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 3075 - 3089
  • [27] Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Lee, Hakjun
    Ha, Sewan
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT I, 2018, 10960 : 541 - 557
  • [28] Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards
    Wen, Fengtong
    Susilo, Willy
    Yang, Guomin
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (04) : 1747 - 1760
  • [29] On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
    Adeli, Morteza
    Bagheri, Nasour
    Meimani, Hamid Reza
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 3075 - 3089
  • [30] Optimal Combined Intrusion Detection and Biometric-Based Continuous Authentication in High Security Mobile Ad Hoc Networks
    Liu, Jie
    Yu, F. Richard
    Lung, Chung-Horng
    Tang, Helen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 806 - 815