Conceivable Security Risks and Authentication Techniques for Smart Devices: A Comparative Evaluation of Security Practices

With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authe...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of automation and computing Vol. 13; no. 4; pp. 350 - 363
Main Authors Muzammal, Syeda Mariam, Shah, Munam Ali, Zhang, Si-Jing, Yang, Hong-Ji
Format Journal Article
LanguageEnglish
Published Beijing Institute of Automation, Chinese Academy of Sciences 01.08.2016
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1476-8186
2153-182X
1751-8520
2153-1838
DOI10.1007/s11633-016-1011-5

Cover

Loading…
More Information
Summary:With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
Bibliography:Smart devices, security risks, authentication, biometric, privacy.
With the rapidly escalating use of smart devices and fraudulent transaction of users' data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
11-5350/TP
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1476-8186
2153-182X
1751-8520
2153-1838
DOI:10.1007/s11633-016-1011-5