Acceptance of subscriber authentication methods for mobile telephony devices

被引:28
作者
Clarke, NL [1 ]
Furnell, SM
Rodwell, PM
Reynolds, PL
机构
[1] Univ Plymouth, Dept Commun & Elect Engn, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Orange Personal Commun Serv Ltd, Bristol, Avon, England
关键词
D O I
10.1016/S0167-4048(02)00304-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorized use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilized and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
引用
收藏
页码:220 / 228
页数:9
相关论文
共 13 条
  • [1] *3GPP, 2000, TERMS REF SERV SYST
  • [2] COPE BJB, ELECTROTECHNOLOG APR, P71
  • [3] COPE JB, ELECTROTECHNOLOG APR, P71
  • [4] *CSI, 2001, COMPUTER SECURITY IS, V7
  • [5] *INT, 2001, LAT GLOB REG CELL ST
  • [6] *INT FOR, 1998, 2 INT FOR
  • [7] *ITUI, 2001, FULL DESCR IMT 2000
  • [8] Jobusch D. L., 1989, Computers & Security, V8, P587, DOI 10.1016/0167-4048(89)90051-5
  • [9] JOYCE R, 1990, COMMUNICATIONS ACM, V33
  • [10] LEGGET J, 1988, INT J MAN MACH STUD, P28