Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
Wireless Personal Communications | 2017年 / 93卷
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [21] Facial attributes for active authentication on mobile devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    IMAGE AND VISION COMPUTING, 2017, 58 : 181 - 192
  • [22] Proximity-based authentication for mobile devices
    Jansen, W
    Gavrila, S
    Korolev, V
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 398 - 404
  • [23] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07) : 2007 - 2024
  • [24] Proximity-based authentication of mobile devices
    Scannell, Adin
    Varshavsky, Alexander
    LaMarca, Anthony
    de Lara, Eyal
    International Journal of Security and Networks, 2009, 4 (1-2) : 4 - 16
  • [25] On Authentication in a Connected Vehicle: Secure Integration of Mobile Devices with Vehicular Networks
    Han, Kyusuk
    Potluri, Swapna Divya
    Shin, Kang G.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 160 - 169
  • [26] Improving authentication of remote card transactions with mobile personal trusted devices
    Bottoni, Andrea
    Dini, Gianluca
    COMPUTER COMMUNICATIONS, 2007, 30 (08) : 1697 - 1712
  • [27] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [28] Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Derhab, Abdelouahid
    Korba, Abdelaziz Amara
    2018 3RD INTERNATIONAL CONFERENCE ON PATTERN ANALYSIS AND INTELLIGENT SYSTEMS (PAIS), 2018, : 227 - 234
  • [29] A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and their Application in Head Mounted Displays
    Olade, Ilesanmi
    Liang, Hai-Ning
    Fleming, Charles
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1997 - 2004
  • [30] Secure voice based authentication for mobile devices: Vaulted Voice Verification
    Johnson, R. C.
    Scheirer, Walter J.
    Boult, Terrance E.
    BIOMETRIC AND SURVEILLANCE TECHNOLOGY FOR HUMAN AND ACTIVITY IDENTIFICATION X, 2013, 8712