User Authentication Schemes for Mobile and Handheld Devices
Autor(a) principal: | |
---|---|
Data de Publicação: | 2008 |
Outros Autores: | |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | INFOCOMP: Jornal de Ciência da Computação |
Texto Completo: | https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237 |
Resumo: | User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users but this method has been shown to have considerable drawbacks. For example, users tend to pick PIN or passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem in handheld devices, some researchers have developed comparatively more secure, affordable and memorable authentication schemes based on graphical assistance, images and audio. In this paper, we conduct a comprehensive survey and analysis of such existing user authentication schemes for mobile and handheld devices. The complete analysis of these schemes in term of usability and security are also discussed in this paper. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to password based authentication schemes. |
id |
UFLA-5_85db8e9d7c4aeac5be7640e8775db8e0 |
---|---|
oai_identifier_str |
oai:infocomp.dcc.ufla.br:article/237 |
network_acronym_str |
UFLA-5 |
network_name_str |
INFOCOMP: Jornal de Ciência da Computação |
repository_id_str |
|
spelling |
User Authentication Schemes for Mobile and Handheld DevicesUser AuthenticationMobile SecurityHandheld DevicesUsability and Computer SecurityUser authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users but this method has been shown to have considerable drawbacks. For example, users tend to pick PIN or passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem in handheld devices, some researchers have developed comparatively more secure, affordable and memorable authentication schemes based on graphical assistance, images and audio. In this paper, we conduct a comprehensive survey and analysis of such existing user authentication schemes for mobile and handheld devices. The complete analysis of these schemes in term of usability and security are also discussed in this paper. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to password based authentication schemes.Editora da UFLA2008-12-01info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237INFOCOMP Journal of Computer Science; Vol. 7 No. 4 (2008): December, 2008; 38-471982-33631807-4545reponame:INFOCOMP: Jornal de Ciência da Computaçãoinstname:Universidade Federal de Lavras (UFLA)instacron:UFLAenghttps://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237/222Copyright (c) 2016 INFOCOMP Journal of Computer Scienceinfo:eu-repo/semantics/openAccessDoja, M. N.Kumar, Naveen2015-07-01T12:39:24Zoai:infocomp.dcc.ufla.br:article/237Revistahttps://infocomp.dcc.ufla.br/index.php/infocompPUBhttps://infocomp.dcc.ufla.br/index.php/infocomp/oaiinfocomp@dcc.ufla.br||apfreire@dcc.ufla.br1982-33631807-4545opendoar:2024-05-21T19:54:26.491435INFOCOMP: Jornal de Ciência da Computação - Universidade Federal de Lavras (UFLA)true |
dc.title.none.fl_str_mv |
User Authentication Schemes for Mobile and Handheld Devices |
title |
User Authentication Schemes for Mobile and Handheld Devices |
spellingShingle |
User Authentication Schemes for Mobile and Handheld Devices Doja, M. N. User Authentication Mobile Security Handheld Devices Usability and Computer Security |
title_short |
User Authentication Schemes for Mobile and Handheld Devices |
title_full |
User Authentication Schemes for Mobile and Handheld Devices |
title_fullStr |
User Authentication Schemes for Mobile and Handheld Devices |
title_full_unstemmed |
User Authentication Schemes for Mobile and Handheld Devices |
title_sort |
User Authentication Schemes for Mobile and Handheld Devices |
author |
Doja, M. N. |
author_facet |
Doja, M. N. Kumar, Naveen |
author_role |
author |
author2 |
Kumar, Naveen |
author2_role |
author |
dc.contributor.author.fl_str_mv |
Doja, M. N. Kumar, Naveen |
dc.subject.por.fl_str_mv |
User Authentication Mobile Security Handheld Devices Usability and Computer Security |
topic |
User Authentication Mobile Security Handheld Devices Usability and Computer Security |
description |
User authentication is a difficulty for every system providing safe access to precious, private information, or personalized services. It is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs). User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users but this method has been shown to have considerable drawbacks. For example, users tend to pick PIN or passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem in handheld devices, some researchers have developed comparatively more secure, affordable and memorable authentication schemes based on graphical assistance, images and audio. In this paper, we conduct a comprehensive survey and analysis of such existing user authentication schemes for mobile and handheld devices. The complete analysis of these schemes in term of usability and security are also discussed in this paper. This paper will be useful for information security researchers and practitioners who are interested in finding an alternative to password based authentication schemes. |
publishDate |
2008 |
dc.date.none.fl_str_mv |
2008-12-01 |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237 |
url |
https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/237/222 |
dc.rights.driver.fl_str_mv |
Copyright (c) 2016 INFOCOMP Journal of Computer Science info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Copyright (c) 2016 INFOCOMP Journal of Computer Science |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Editora da UFLA |
publisher.none.fl_str_mv |
Editora da UFLA |
dc.source.none.fl_str_mv |
INFOCOMP Journal of Computer Science; Vol. 7 No. 4 (2008): December, 2008; 38-47 1982-3363 1807-4545 reponame:INFOCOMP: Jornal de Ciência da Computação instname:Universidade Federal de Lavras (UFLA) instacron:UFLA |
instname_str |
Universidade Federal de Lavras (UFLA) |
instacron_str |
UFLA |
institution |
UFLA |
reponame_str |
INFOCOMP: Jornal de Ciência da Computação |
collection |
INFOCOMP: Jornal de Ciência da Computação |
repository.name.fl_str_mv |
INFOCOMP: Jornal de Ciência da Computação - Universidade Federal de Lavras (UFLA) |
repository.mail.fl_str_mv |
infocomp@dcc.ufla.br||apfreire@dcc.ufla.br |
_version_ |
1799874740846854144 |