Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

03/27/2018
by   Mohamed Amine Ferrag, et al.
0

This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we describe and give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based attacks, combined eavesdropping and identity-based attacks, manipulation-based attacks, and service-based attacks. We also provide a classification of countermeasures into four types of categories, including, cryptographic functions, personal identification, classification algorithms, and channel characteristics. According to these, we categorize authentication schemes for smart mobile devices in four categories, namely, 1) biometric-based authentication schemes, 2) channel-based authentication schemes, 3) factor-based authentication schemes, and 4) ID-based authentication schemes. In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in the form of tables. Finally, we identify open challenges and future research directions.

READ FULL TEXT
research
11/18/2019

"Please enter your PIN" – On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices

Nowadays, most mobile devices support biometric authentication schemes l...
research
05/10/2021

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey

Today's mobile devices contain densely packaged system-on-chips (SoCs) w...
research
07/17/2022

Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends

Todays world is digital, global, and interconnected and mobile devices a...
research
07/11/2019

Challenges and Directions for Authentication in Pervasive Computing

We quickly approach a "pervasive future" where pervasive computing is th...
research
05/18/2017

Continuous Implicit Authentication for Mobile Devices based on Adaptive Neuro-Fuzzy Inference System

As mobile devices have become indispensable in modern life, mobile secur...
research
12/10/2021

An Interface between Legacy and Modern Mobile Devices for Digital Identity

In developing regions a substantial number of users rely on legacy and u...
research
01/23/2018

Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication

In this study, we examine the ways in which user attitudes towards priva...

Please sign up or login with your details

Forgot password? Click here to reset