Modern Authentication Techniques in Smart Phones: Security and Usability Perspective
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 1
Abstract
A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.
Authors and Affiliations
Usman Shafique, Hikmat Khan, Sabah-ud-din Waqar, Asma Sher, Adnan Zeb, Uferah Shafi, Rahim Ullah, Rehmat Ullah, Faisal Bashir, Munam Ali Shah
A Parallel Simulated Annealing Algorithm for Weapon-Target Assignment Problem
Weapon-target assignment (WTA) is a combinatorial optimization problem and is known to be NP-complete. The WTA aims to best assignment of weapons to targets to minimize the total expected value of the surviving targets....
Discovering a Secure Path in MANET by Avoiding Black Hole Attack
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reli...
Multi-Level Encryption Framework
Multi-level encryption approaches are becoming more popular as they combine the strength of multiple basic/traditional approaches into a complex one. Many multi-level encryption approaches have been introduced for differ...
Sustainable Green SLA (GSLA) Validation using Bayesian Network Model
Currently, most of the IT (Information Technology) and ICT (Information and Communication Technology) industries/companies provides their various services/product at a different level of customers/users through newly dev...
Effectiveness of Existing CAD-Based Research Work towards Screening Breast Cancer
Accurate detection as well as classification of the breast cancer is still an unsolved question in the medical image processing techniques. We reviewed the existing Computer Aided Diagnosis (CAD)-based techniques to find...