Visible to the public Mobile biometrics: Towards a comprehensive evaluation methodology

TitleMobile biometrics: Towards a comprehensive evaluation methodology
Publication TypeConference Paper
Year of Publication2017
AuthorsBuriro, A., Akhtar, Z., Crispo, B., Gupta, S.
Conference Name2017 International Carnahan Conference on Security Technology (ICCST)
ISBN Number978-1-5386-1585-0
Keywordsauthentication, biometrics, biometrics (access control), Guidelines, human factors, human-computer interaction, Metrics, Mobile Biometrics, Mobile communication, Pervasive Computing Security, pubcrawl, Resiliency, Scalability, smart phones, Smartphone Authentication, Testing, Training
Abstract

Smartphones have become the pervasive personal computing platform. Recent years thus have witnessed exponential growth in research and development for secure and usable authentication schemes for smartphones. Several explicit (e.g., PIN-based) and/or implicit (e.g., biometrics-based) authentication methods have been designed and published in the literature. In fact, some of them have been embedded in commercial mobile products as well. However, the published studies report only the brighter side of the proposed scheme(s), e.g., higher accuracy attained by the proposed mechanism. While other associated operational issues, such as computational overhead, robustness to different environmental conditions/attacks, usability, are intentionally or unintentionally ignored. More specifically, most publicly available frameworks did not discuss or explore any other evaluation criterion, usability and environment-related measures except the accuracy under zero-effort. Thus, their baseline operations usually give a false sense of progress. This paper, therefore, presents some guidelines to researchers for designing, implementation, and evaluating smartphone user authentication methods for a positive impact on future technological developments.

URLhttps://ieeexplore.ieee.org/document/8167859
DOI10.1109/CCST.2017.8167859
Citation Keyburiro_mobile_2017