Research Article | Open Access | Download PDF
Volume 69 | Issue 1 | Year 2021 | Article Id. IJETT-V69I1P211 | DOI : https://doi.org/10.14445/22315381/IJETT-V69I1P211
Digital Authentication Methodologies for Mobile Devices
Jyothy Joseph, Dr.K Nirmala
Citation :
Jyothy Joseph, Dr.K Nirmala, "Digital Authentication Methodologies for Mobile Devices," International Journal of Engineering Trends and Technology (IJETT), vol. 69, no. 1, pp. 74-80, 2021. Crossref, https://doi.org/10.14445/22315381/IJETT-V69I1P211
Abstract
In the android mobile ecosphere, data loss and financial loss are the two potential threats facing the current epoch. Both threats have multiple subdivisions and impacts many of the mobile users and organizations. Many users are passionate and thrilled to use various new features introduced by various mobile companies and applications. Without properly evaluating the security capabilities and vulnerabilities, many of them use the various extensive features available in the system. By default, all the devices and applications have different levels of built-in security features, but many of them do not utilize this appropriately or are not aware of these in the right sense. This study has attempted to list the various secured authentication features available in different layers and the type of protection that enables these features. Here, the analyses chart security features in hierarchical order starting from device-level security and then moves on to the application level security and finally fragments itself into an activity or transaction level of security features.
Keywords
Device Level Authentication, Application Level Authentication, Transaction Level Authentication, Biometric Authentication, Multi-Factor Authentication
References
[1] Sandeep Gupta, Attaullah Buriro, and Bruno Crispo (2018) [Ways and Types to Secure Access] https://www.hindawi.com/journals/misy/2018/2649598/
[2] Abdulaziz Alzubaidi and Jugal Kalita (2019) [Authentication of Smartphone Users Using Behavioral Biometrics] https://arxiv.org/pdf/1911.04104.pdf
[3] Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos (2012) [Progressive authentication] https://homes.cs.washington.edu/~kstrauss/publications/pa.pdf
[4] Matthew Haughn and Margaret Rose (2014) [Mobile authentication] https://searchsecurity.techtarget.com/definition/mobile-authentication
[5] John Powers (2019) [Authentication with modern methods] https://searchmobilecomputing.techtarget.com/feature/Tackle-mobile-device-authentication-with-modern-methods
[6] Secure Technology Alliance Mobile Council (2017) [Mobile Identity Authentication] https://www.securetechalliance.org/wp-content/uploads/Mobile-Identity-Authentication-WP-FINAL-March-2017.pdf
[7] Jim Haviland (2019) [Existing authentication options] https://insights.samsung.com/2019/09/06/which-authentication-method-is-best-for-your-business-phones/
[8] National Cyber Security Center UK (2020) [Mobile Device Guidance] https://www.ncsc.gov.uk/collection/mobile-device-guidance/enterprise-authentication-policy
[9] Robert Triggs [Two factor authentication] (2019) https://www.androidauthority.com/two-factor-authentication-explained-971653/
[10] Alice MJ (2020) [Screen lock] https://drfone.wondershare.com/unlock/android-lock-screen-settings.html
[11] Merry Marwig (2020) [Password less Authentication] https://research.g2.com/insights/guide-to-passwordless-authentication
[12] Android Central (2018) [Smart Lock] https://www.androidcentral.com/smart-lock
[13] Simon Hill (2018) [Smart Lock Working] https://www.digitaltrends.com/mobile/how-to-use-android-smart-lock/
[14] Dean Nicolls (2019) [Biometric Authentication] https://www.jumio.com/what-is-biometric-authentication/
[15] OneSpan (2020) [Multi Factor Authentication] https://www.onespan.com/topics/multi-factor-authentication.