Modern Authentication Techniques in Smart Phones: Security and Usability Perspective

Abstract

A smartphone has more advanced computing ability and connectivity than basic featured phones. Presently, we are moving from the Internet society to a mobile society where more and more access to the information is required. This has resulted in a mobile security which is no longer immanent, but imperative. Smartphone authentication has received substantial attention of the research community for the past several years because there have been modern developments beyond the classical PINs and passwords making user authentication more challenging. In this paper, we critically analyze the attacks and the vulnerabilities in smartphones’ authentication mechanisms. A comparative analysis of different authentication techniques along with the usage of the different authentication methods is discussed which lead the end-user towards choosing the most suitable and customizable authentication technique.

Authors and Affiliations

Usman Shafique, Hikmat Khan, Sabah-ud-din Waqar, Asma Sher, Adnan Zeb, Uferah Shafi, Rahim Ullah, Rehmat Ullah, Faisal Bashir, Munam Ali Shah

Keywords

Related Articles

Energy-Aware Virtual Network Embedding Approach for Distributed Cloud

Network virtualization has caught the attention of many researchers in recent years. It facilitates the process of creating several virtual networks over a single physical network. Despite this advantage, however, networ...

A Novel Ball on Beam Stabilizing Platform with Inertial Sensors

This research paper presents dynamic modeling of inertial sensor based one degree of freedom (1-DoF) stabilizing platform. Plant is a ball on a pivoted beam. Nonlinear modeling of the plant is done. Ball position on beam...

Efficient K-Nearest Neighbor Searches for Multiple-Face Recognition in the Classroom based on Three Levels DWT-PCA

The main weakness of the k-Nearest Neighbor algorithm in face recognition is calculating the distance and sort all training data on each prediction which can be slow if there are a large number of training instances. Thi...

Dynamic Modification of Activation Function using the Backpropagation Algorithm in the Artificial Neural Networks

The paper proposes the dynamic modification of the activation function in a learning technique, more exactly backpropagation algorithm. The modification consists in changing slope of sigmoid function for activation funct...

Content Based Image Retrieval Using Gray Scale Weighted Average Method

High feature vector dimension quietly remained a curse element for Content Based Image Retrieval (CBIR) system which eventually degrades its efficiency while indexing similar images from database. This paper proposes CBI...

Download PDF file
  • EP ID EP249896
  • DOI 10.14569/IJACSA.2017.080142
  • Views 109
  • Downloads 0

How To Cite

Usman Shafique, Hikmat Khan, Sabah-ud-din Waqar, Asma Sher, Adnan Zeb, Uferah Shafi, Rahim Ullah, Rehmat Ullah, Faisal Bashir, Munam Ali Shah (2017). Modern Authentication Techniques in Smart Phones: Security and Usability Perspective. International Journal of Advanced Computer Science & Applications, 8(1), 331-340. https://www.europub.co.uk/articles/-A-249896