Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
Wireless Personal Communications | 2017年 / 93卷
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [1] Efficiency of Paid Authentication Methods for Mobile Devices
    Kim, Jeong Yeon
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 543 - 551
  • [2] Biometric Authentication on Mobile Devices
    Mayron, Liam M.
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 70 - 73
  • [3] Gait Recognition as an Authentication Method for Mobile Devices
    Axente, Matei-Sorin
    Dobre, Ciprian
    Ciobanu, Radu-Ioan
    Purnichescu-Purtan, Raluca
    SENSORS, 2020, 20 (15) : 1 - 17
  • [4] Banknote Authentication with Mobile Devices
    Lohweg, Volker
    Hoffmann, Jan Leif
    Doerksen, Helene
    Hildebrand, Roland
    Gillich, Eugen
    Hofmann, Juerg
    Schaede, Johannes
    MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013, 2013, 8665
  • [5] Towards authentication using mobile devices An investigation of the prerequisites
    Weippl, E
    Essmayr, W
    Gruber, F
    Stockner, W
    Trenker, T
    ADVANCED COMMUNICATIONS AND MULTIMEDIA SECURITY, 2002, 100 : 91 - 105
  • [6] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [7] Authentication in mobile cloud computing: A survey
    Alizadeh, Mojtaba
    Abolfazli, Saeid
    Zamani, Mazdak
    Baharun, Sabariah
    Sakurai, Kouichi
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 59 - 80
  • [8] A Survey of Authentication Methods in Mobile Cloud Computing
    Reshmi, G.
    Rakshmy, C. S.
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 58 - 63
  • [9] Expanding Continuous Authentication with Mobile Devices
    Schaffer, Kim B.
    COMPUTER, 2015, 48 (11) : 92 - 95
  • [10] Continuous User Authentication on Mobile Devices
    Patel, Vishal M.
    Chellappa, Rama
    Chandra, Deepak
    Barbello, Brandon
    IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (04) : 49 - 61