Abstract
The paper is intended as a short review of user authentication problem for mobile devices. The emphasis is put on smartphones and tablets, that nowadays are very similar to miniaturized personal computers with much more sensors of various origin. The sensors are described with remarks on their usefulness for user authentication. Deficiencies of traditional user authentication methods based on knowledge are pointed out and the need for new – more secure but also comfortable – user authentication mechanisms is reasoned. Preliminary user authentication systems employing biometric features are discussed and hence the generally unused potential of biometrics for mobile devices is demonstrated.
Chapter PDF
Similar content being viewed by others
References
Allen, M.: A day in the life of mobile data. In: Mobile Security. British Computer Society (2005), http://www.bcs.org/server.php?show=conWebDoc.2774 (accessed May 14, 2012)
Derawi, M.O., Nickel, C., Bours, P., Busch, C.: Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 306–311 (2010), doi:10.1109/IIHMSP.2010.83
Burnett, M., Kleiman, D.: Perfect Passwords. Syngress, Rock-land (2005)
Ivan, A., Goodfellow, J.: Improvements in or relating to Customer-Operated Dispensing Systems. UK Patent #GB1197183 (1966), doi:10.1049/el:19650200
Bonneau, J., Preibusch, S., Anderson, R.: A birthday present every eleven wallets? The security of customer-chosen banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25–40. Springer, Heidelberg (2012), http://www.cl.cam.ac.uk/~jcb82/doc/BPA12-FC-banking_pin_security.pdf (accessed May 14, 2012)
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge Attacks on Smartphone Touch Screens. In: Workshop on Offensive Technology (2010), http://static.usenix.org/event/woot10/tech/full_papers/Aviv.pdf (accessed May 14, 2012)
Whisper Systems WhisperCore, http://whispersys.com/screenlock.html (accessed May 14, 2012)
Citty, J., Tapi, D.R.H.: Touch-screen authentication using partitioned images. Elon University Technical Report (2010), http://facstaff.elon.edu/dhutchings/papers/citty2010tapi.pdf (accessed May 15, 2012)
Tolba, A.S., El-baz, A.H., El-harby, A.A.: Face Recognition: A Literature Review. International Journal of Signal Processing 2(2), 88–103 (2006)
Spillane, R.: Keyboard Apparatus for Personal Identification. IBM Technical Disclosure Bulletin 17(3346) (1975), doi:10.1109/MSP.2004.89
Karatzouni, S., Clarke, N.: Keystroke Analysis for Thumb-based Keyboards on Mobile Devices. In: Venter, H., Eloff, M., Labuschagne, L., von Eloff, J., Solms, R. (eds.) SEC 2007. IFIP, vol. 232, pp. 253–263. Springer, Boston (2007)
Rybnik, M., Tabędzki, M., Saeed, K.: A Keystroke Dynamics Based System for User Identification. In: Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications: CISIM 2008, pp. 225–230. IEEE Computer Society (2008), doi:10.1109/CISIM.2008.8
Loy, C.C., Lim, C.P., Lai, W.K.: Pressure-based Typing Biometrics User Authentication using the Fuzzy ARTMAP. In: Neural Network International Conference on Neural Information Processing (2005), http://www.eecs.qmul.ac.uk/~ccloy/files/iconip_2005.pdf (accessed May 14, 2012)
Sae-Bae, N., Ahmed, K., Isbister, K., Memon, N.: Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012), pp. 977–986. ACM, New York (2012), doi:10.1145/2207676.2208543
Hashia, S., Pollet, C., Stamp, M., Hall, M.Q.: On Using Mouse Movements As a Biometric. In: Proceedings of the International Conference on Computer Science and its Applications (2005), http://www.cs.sjsu.edu/faculty/pollett/papers/shivanipaper.pdf (accessed May 15, 2012)
Tabędzki, M., Saeed, K.: New Method to Test Mouse Movement Dynamics for Human Identification. In: KBIB 2005 Conference, Tom I, Computer Science Telemedicine Systems, pp. 467–472. Czestochowa Technical University Press, Poland (2005) (in Polish), http://home.agh.edu.pl/~saeed/arts/2005%20KBIB.pdf (accessed May 15, 2012)
Myers, L.: An Exploration of Voice Biometrics. GSEC Practical Assignment (2004), http://www.sans.org/reading_room/whitepapers/authentication/exploration-voice-biometrics_1436 (accessed May 15, 2012)
De Luca, A., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and I know it’s you!: implicit authentication based on touch screen patterns. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems (CHI 2012), pp. 987–996. ACM, New York (2012), doi:10.1145/2207676.2208544
Hazen, T.J., Weinstein, E., Park, A.: Towards robust person recognition on handheld devices using face and speaker identification technologies. In: Proceedings of the 5th International Conference on Multimodal Interfaces (ICMI 2003), pp. 289–292. ACM, New York (2003), doi:10.1145/958432.958485
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Rogowski, M., Saeed, K., Rybnik, M., Tabedzki, M., Adamski, M. (2013). User Authentication for Mobile Devices. In: Saeed, K., Chaki, R., Cortesi, A., Wierzchoń, S. (eds) Computer Information Systems and Industrial Management. CISIM 2013. Lecture Notes in Computer Science, vol 8104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40925-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-40925-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40924-0
Online ISBN: 978-3-642-40925-7
eBook Packages: Computer ScienceComputer Science (R0)