Thullier Florentin, Bouchard Bruno et Ménélas Bob-Antoine-Jerry. (2017). Exploring mobile authentication mechanisms from personal identification numbers to biometrics including the future trend. Dans Weizhi Meng, Xiapu Luo, Steven Furnell et Jianying Zhou (dir.), Protecting mobile networks and devices : challenges and solutions. (p. 3-27). Boca Raton, Florida : CRC Press.
Le texte intégral n'est pas disponible pour ce document.
Résumé
The growing market of mobile devices forces to question about how to protect users’ credentials and data stored on such devices. Authentication mechanisms remain the first layer of security in the use of mobile devices. However, several of such mechanisms that have been already proposed were designed in a machine point of view. As a matter of fact, they are not compatible with behaviors human have while using their mobile devices in the daily life. Consequently, users adopted unsafe habits that may compromise the proper functioning of authentica-tion mechanisms according to the safety aspect. In this chapter, the strength and the weakness of the current schemes, from the simpler ones such as PIN to the more complex biometric systems such as fingerprint, are high-lighted. Besides, we offer an evaluation, based on both existing and new criteria we suggest, chiefly focused on the usability of these schemes for the user. While each of them have benefits as well as disadvantages, we finally pro-pose a conclusion lean toward the aftermath of authentication on mobile devices that head for new perspectives as regards no password and ubiquitous authentication mechanisms.
Type de document: | Chapitre de livre |
---|---|
Date: | 2017 |
Lieu de publication: | Boca Raton, Florida |
Sujets: | Sciences naturelles et génie > Sciences mathématiques > Informatique |
Département, module, service et unité de recherche: | Départements et modules > Département d'informatique et de mathématique |
Éditeurs: | Meng, Weizhi Luo, Xiapu Furnell, Steven Zhou, Jianying |
Mots-clés: | informatique, mobile communication systems, security mesures, smartphones, authentication, mobile device, smartphone, usability |
Déposé le: | 08 déc. 2020 20:38 |
---|---|
Dernière modification: | 15 déc. 2020 00:22 |
Éditer le document (administrateurs uniquement)