Conceivable Security Risks and Authentication Techniques for Smart Devices: A Comparative Evaluation of Security Practices
With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authe...
Saved in:
Published in | International journal of automation and computing Vol. 13; no. 4; pp. 350 - 363 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Beijing
Institute of Automation, Chinese Academy of Sciences
01.08.2016
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 1476-8186 2153-182X 1751-8520 2153-1838 |
DOI | 10.1007/s11633-016-1011-5 |
Cover
Loading…
Summary: | With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques. |
---|---|
Bibliography: | Smart devices, security risks, authentication, biometric, privacy. With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques. 11-5350/TP ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1476-8186 2153-182X 1751-8520 2153-1838 |
DOI: | 10.1007/s11633-016-1011-5 |