LiveZilla Live Chat Software

Constellation, le dépôt institutionnel de l'Université du Québec à Chicoutimi

Exploring mobile authentication mechanisms from personal identification numbers to biometrics including the future trend

Thullier Florentin, Bouchard Bruno et Ménélas Bob-Antoine-Jerry. (2017). Exploring mobile authentication mechanisms from personal identification numbers to biometrics including the future trend. Dans Protecting mobile networks and devices : challenges and solutions. (p. 3-27). Boca Raton, Florida : CRC Press.

Le texte intégral n'est pas disponible pour ce document.


The growing market of mobile devices forces to question about how to protect users’ credentials and data stored on such devices. Authentication mechanisms remain the first layer of security in the use of mobile devices. However, several of such mechanisms that have been already proposed were designed in a machine point of view. As a matter of fact, they are not compatible with behaviors human have while using their mobile devices in the daily life. Consequently, users adopted unsafe habits that may compromise the proper functioning of authentica-tion mechanisms according to the safety aspect. In this chapter, the strength and the weakness of the current schemes, from the simpler ones such as PIN to the more complex biometric systems such as fingerprint, are high-lighted. Besides, we offer an evaluation, based on both existing and new criteria we suggest, chiefly focused on the usability of these schemes for the user. While each of them have benefits as well as disadvantages, we finally pro-pose a conclusion lean toward the aftermath of authentication on mobile devices that head for new perspectives as regards no password and ubiquitous authentication mechanisms.

Type de document:Chapitre de livre
Lieu de publication:Boca Raton, Florida
Sujets:Sciences naturelles et génie > Sciences mathématiques > Informatique
Département, module, service et unité de recherche:Départements et modules > Département d'informatique et de mathématique
Éditeurs:Meng, Weizhi
Luo, Xiapu
Furnell, Steven
Zhou, Jianying
Mots-clés:informatique, mobile communication systems, security mesures, smartphones, authentication, mobile device, smartphone, usability
Déposé le:08 déc. 2020 20:38
Dernière modification:15 déc. 2020 00:22
Afficher les statistiques de telechargements

Éditer le document (administrateurs uniquement)

Creative Commons LicenseSauf indication contraire, les documents archivés dans Constellation sont rendus disponibles selon les termes de la licence Creative Commons "Paternité, pas d'utilisation commerciale, pas de modification" 2.5 Canada.

Bibliothèque Paul-Émile-Boulet, UQAC
555, boulevard de l'Université
Chicoutimi (Québec)  CANADA G7H 2B1
418 545-5011, poste 5630