Transparent authentication systems for mobile device security: A review
Title | Transparent authentication systems for mobile device security: A review |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Alotaibi, S., Furnell, S., Clarke, N. |
Conference Name | 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) |
Date Published | dec |
Keywords | authentication, authorisation, behavioural profiling, Biometric, contact lists, data protection, Fingerprint recognition, keystroke, Mobile communication, mobile computing, mobile device security, mobile devices, Mobile handsets, mobile security, mobile user, multimodal, performance evaluation, personal information, point-of-entry authentication, pubcrawl170115, security improvement, sensitive data, sensitivity application level, Sensors, task re-authentication, text messages, transparent authentication, transparent authentication systems, usability, user re-authentication |
Abstract | Sensitive data such as text messages, contact lists, and personal information are stored on mobile devices. This makes authentication of paramount importance. More security is needed on mobile devices since, after point-of-entry authentication, the user can perform almost all tasks without having to re-authenticate. For this reason, many authentication methods have been suggested to improve the security of mobile devices in a transparent and continuous manner, providing a basis for convenient and secure user re-authentication. This paper presents a comprehensive analysis and literature review on transparent authentication systems for mobile device security. This review indicates a need to investigate when to authenticate the mobile user by focusing on the sensitivity level of the application, and understanding whether a certain application may require a protection or not. |
DOI | 10.1109/ICITST.2015.7412131 |
Citation Key | alotaibi_transparent_2015 |
- multimodal
- user re-authentication
- usability
- transparent authentication systems
- transparent authentication
- text messages
- task re-authentication
- sensors
- sensitivity application level
- sensitive data
- security improvement
- pubcrawl170115
- point-of-entry authentication
- personal information
- performance evaluation
- authentication
- mobile user
- Mobile Security
- Mobile handsets
- mobile devices
- mobile device security
- mobile computing
- Mobile communication
- keystroke
- Fingerprint recognition
- Data protection
- contact lists
- biometric
- behavioural profiling
- authorisation