Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Author (ESR): 
Sandeep Gupta (Universita Degli Studi Di Trento)
Sandeep Gupta
Attaullah Buriro
Bruno Crispo

Smartphones are the most popular and widespread personal devices. Apart from their conventional use, i.e., calling and texting, they have also been used to perform multiple security-sensitive activities, such as online banking and shopping, social networking, taking pictures and emailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, e.g., anytime-anywhere computing, etc. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years, however, their presentation might be perplexing
to the new researchers to this domain, under the shade of several buzzwords, e.g., active, continuous, implicit, static, transparent,
etc., being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions
were evaluated mainly in terms of accuracy, overlooking a very important aspect - the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication
schemes exhibiting their security and usability issues.

Mobile Information Systems (Special Issue), Hindawi Journals, 2018
Wednesday, January 10, 2018