首页> 外文期刊>Computer networks >User authentication on mobile devices: Approaches, threats and trends
【24h】

User authentication on mobile devices: Approaches, threats and trends

机译:移动设备上的用户身份验证:方法,威胁和趋势

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Mobile devices have brought a great convenience to us these years, which allow the users to enjoy the anytime and anywhere various applications such as the online shopping, Internet banking, navigation and mobile media. While the users enjoy the convenience and flexibility of the "Go Mobile" trend, their sensitive private information (e.g., name and credit card number) on the mobile devices could be disclosed. An adversary could access the sensitive private information stored on the mobile device by unlocking the mobile devices. Moreover, the user's mobile services and applications are all exposed to security threats. For example, the adversary could utilize the user's mobile device to conduct non-permitted actions (e.g., making online transactions and installing malwares). The authentication on mobile devices plays a significant role to protect the user's sensitive information on mobile devices and prevent any non-permitted access to the mobile devices. This paper surveys the existing authentication methods on mobile devices. In particular, based on the basic authentication metrics (i.e., knowledge, ownership and biometrics) used in existing mobile authentication methods, we categorize them into four categories, including the knowledge-based authentication (e.g., passwords and lock patterns), physiological biometricbased authentication (e.g., fingerprint and iris), behavioral biometrics-based authentication (e.g., gait and hand gesture), and two/multi-factor authentication. We compare the usability and security level of the existing authentication approaches among these categories. Moreover, we review the existing attacks to these authentication approaches to reveal their vulnerabilities. The paper points out that the trend of the authentication on mobile devices would be the multi-factor authentication, which determines the user's identity using the integration (not the simple combination) of more than one authentication metrics. For example, the user's behavior biometrics (e.g., keystroke dynamics) could be extracted simultaneously when he/she inputs the knowledge-based secrets (e.g., PIN), which can provide the enhanced authentication as well as sparing the user's trouble to conduct multiple inputs for different authentication metrics. (C) 2020 Elsevier B.V. All rights reserved.
机译:这些年来,移动设备给我们带来了极大的便利,使用户可以随时随地享受各种应用程序,例如在线购物,互联网银行,导航和移动媒体。在用户享受“ Go Mobile”趋势的便利性和灵活性的同时,可以公开他们在移动设备上的敏感私人信息(例如,姓名和信用卡号)。攻击者可以通过解锁移动设备来访问存储在移动设备上的敏感私人信息。而且,用户的移动服务和应用程序都面临安全威胁。例如,对手可以利用用户的移动设备来执行未经许可的动作(例如进行在线交易和安装恶意软件)。移动设备上的身份验证在保护用户在移动设备上的敏感信息并防止对移动设备的任何未经许可的访问方面起着重要作用。本文概述了移动设备上现有的身份验证方法。特别是,根据现有移动身份验证方法中使用的基本身份验证指标(即知识,所有权和生物指标),我们将其分为四类,包括基于知识的身份验证(例如密码和锁定模式),基于生理生物特征的身份验证(例如指纹和虹膜),基于行为生物特征的身份验证(例如步态和手势)以及两种/多因素身份验证。我们在这些类别中比较了现有身份验证方法的可用性和安全性级别。此外,我们回顾了对这些身份验证方法的现有攻击,以揭示其漏洞。本文指出,在移动设备上进行身份验证的趋势将是多因素身份验证,它使用多个身份验证指标的集成(而不是简单组合)来确定用户的身份。例如,当他/她输入基于知识的秘密(例如PIN)时,可以同时提取用户的行为生物特征(例如,击键动态),这可以提供增强的身份验证并避免用户进行多次输入的麻烦用于不同的身份验证指标。 (C)2020 Elsevier B.V.保留所有权利。

著录项

  • 来源
    《Computer networks》 |2020年第7期|107118.1-107118.21|共21页
  • 作者

  • 作者单位

    Rutgers State Univ Dept Elect & Comp Engn WINLAB Piscataway NJ 08854 USA|Louisiana State Univ Dept Comp Sci & Engn Baton Rouge LA 70803 USA;

    SUNY Binghamton Comp Sci Dept Binghamton NY 13902 USA;

    Rutgers State Univ Dept Elect & Comp Engn WINLAB Piscataway NJ 08854 USA;

    Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    User authentication; Mobile device; Embedded sensor; Authentication attack;

    机译:用户认证;移动设备;嵌入式传感器认证攻击;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号