A critical insight into the identity authentication systems on smartphones

The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the con...

Full description

Saved in:
Bibliographic Details
Main Authors: Mehraj, Tehseen (Author), Aman Sheheryar, Mir (Author), Ahmed Lone, Sajaad (Author), Mir, A. H. (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-03-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02386 am a22003253u 4500
001 ijeecs13049_10746
042 |a dc 
100 1 0 |a Mehraj, Tehseen  |e author 
100 1 0 |e contributor 
700 1 0 |a Aman Sheheryar, Mir  |e author 
700 1 0 |a Ahmed Lone, Sajaad  |e author 
700 1 0 |a Mir, A. H.  |e author 
245 0 0 |a A critical insight into the identity authentication systems on smartphones 
260 |b Institute of Advanced Engineering and Science,   |c 2019-03-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/13049 
520 |a The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing ones. The need for such a security solution persists that should be able to thwart not only the contemporary threats but also offer continued support without bowing down to progression in technology. Though some security solutions have been contemplated, a lack of standardised or absolute security solution which can provide a feasible and secure solution to mobile phones exists. In this paper, a survey based on various biometric and non-biometric access management schemes has been performed. The copious solutions put forward by researchers so far were discovered to fail in traits like user adaptability and efficiency. Each of the works put forward by various researchers has been single-handedly contemplated followed by analysis. Ultimately, open problems and challenges were inferences from the survey conducted. 
540 |a Copyright (c) 2018 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Multimodal biometrics; user authentication; physiological biometrics; behavioural biometrics; smartphones 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 13, No 3: March 2019; 982-989 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v13.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/13049/10746 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/13049/10746  |z Get fulltext