Single Input Multi Factor User Authentication Protocol for Smartphone (original) (raw)
Related papers
Multimodal Biometric Authentication for Smartphones
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2021
Smartphones have become a crucial way of storing sensitive information; therefore, the user's privacy needs to be highly secured. This can be accomplished by employing the most reliable and accurate biometric identification system available currently which is, Eye recognition. However, the unimodal eye biometric system is not able to qualify the level of acceptability, speed, and reliability needed. There are other limitations such as constrained authentication in real time applications due to noise in sensed data, spoof attacks, data quality, lack of distinctiveness, restricted amount of freedom, lack of universality and other factors. Therefore, multimodal biometric systems have come into existence in order to increase security as well as to achieve better performance.[1] This paper provides an overview of different multimodal biometric (multibiometric) systems for smartphones being employed till now and also proposes a multimodal biometric system which can possibly overcome the limitations of the current biometric systems.
Multi-Layered Multimodal Biometric Authentication for Smartphone Devices
International Journal of Interactive Mobile Technologies (iJIM)
As technological advances in smartphone domain increase, so are the issues that pertain to security and privacy. In current literature, multimodal biometric approach is addressed at length for purpose of improving secured access into personal devices. Moreover, most of the financial institutions such as banks, etc. enforce two or three step access into their corporate data to enforce security. However, personal devices currently do not support similar applications or way of enforcing multilayered access to its different domains/regions of data. In this paper, a multilayered multimodal biometric approach using three biometric methods (such as finger print, face and voice) is proposed for smartphones. It is shown that fusion of biometric methods can be layered to enforce secured access to private data on smartphone. The experimental results are presented.
Privacy Compliant Multi-biometric Authentication on Smartphones
2018
Smartphones are more and more used by Internet users for different services such as social networks, ecommerce or email. User authentication with passwords on such devices is not user-friendly and does not offer a high security level for this task. Biometrics is becoming one popular solution to achieve this goal with the embedding of fingerprint scanners in smartphones. In this paper, we propose a new protocol combining fingerprint and behavioral biometrics to enhance the security of user authentication while preserving usability and privacy. The behavior when entering a pattern based authentication on the smartphone touch screen is considered as a fast and usable solution for users. We think the proposed multi-biometric solution offers great advantages for many applications such as e-payment in terms of security, usability and privacy. We show through experimental results the efficiency of the proposed method.
Design and Development of a Secure and Efficient Authentication System for Mobile Devices
IEEE Xplore, 2023
With the widespread adoption of mobile devices in our daily lives, the need for robust and secure authentication systems has become paramount. This paper presents the design and development of a novel authentication system specifically tailored for mobile devices. Our system addresses the challenges posed by the vulnerabilities and limitations inherent in mobile platforms while ensuring high security and efficiency. Through an extensive analysis of existing authentication methods, we propose a novel approach that combines multi-factor authentication and biometrics to enhance security. We provide implementation details, including the integration of biometric techniques such as fingerprint recognition and facial recognition, and evaluate the system's performance through rigorous testing. The results demonstrate the effectiveness of our solution in providing a secure and efficient authentication mechanism for mobile devices.
International Journal of Information Technology and Computer Science
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual a...
Mobile Multimedia/Image Processing, Security, and Applications 2010, 2010
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues
Intelligent Systems Reference Library, 2014
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for exammple, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized access The current operating systems of mobile smartphones offer different authentication mechanisms. Nonetheless, in some situations, these mechanisms are vulnerable and in other situations, they are not user friendly enough, thus not widely adopted. In this chapter, we will give an overview of the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment. In addition, the pro and cons of these techniques will be highlighted. Moreover, a comparison among these techniques will be conducted. The chapter also discuss the other techniques which could much suitable for the current environment of the mobile applications. Furthermore, it discuss a number of open issues of the mobile authentication which needs further research in the future to improve the adoption of the biometric authentication in the smartphones environment.
Mobile biometrics: Towards a comprehensive evaluation methodology
2017 International Carnahan Conference on Security Technology (ICCST)
Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.
Multimodal person authentication on a smartphone under realistic conditions
2006
Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA).
Biometric Authentication Methods on Smartphones: A Survey
PsychNology J., 2016
Nowadays, users are starting to develop a symbiotic bound with their smartphones. Users continuously carry these devices and use them for daily communication activities and social network interactions. On the other hand, a smartphone is equipped with sensors that can infer not only information about the context (e.g., location), but also about its owner. Since smartphones handle a huge amount of private information, recent techniques rely on those sensing capabilities to authenticate the user, measuring her biometric features. In this paper, we survey the most relevant biometric authentication methods on smartphones proposed in the literature. We categorize such methods by the nature of biometrics used, by their temporal features and by the sensing capabilities they rely on. Moreover, we draw some future directions in this promising research topic.