Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues

dc.cclicenceCC-BY-NCen
dc.contributor.authorFerrag, Mohamed Amine
dc.contributor.authorMaglaras, Leandros
dc.contributor.authorDerhab, Abdelouahid
dc.contributor.authorJanicke, Helge
dc.date.acceptance2019
dc.date.accessioned2019-09-05T14:01:57Z
dc.date.available2019-09-05T14:01:57Z
dc.date.issued2019
dc.descriptionThe file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.en
dc.description.abstractThis paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based attacks, combined eavesdropping and identity-based attacks, manipulation-based attacks, and service-based attacks. This is followed by a description of multiple existing threat models. We also provide a classification of countermeasures into four types of categories, including, cryptographic functions, personal identification, classification algorithms, and channel characteristics. According to the characteristics of the countermeasure along with the authentication model iteself, we categorize the authentication schemes for smart mobile devices in four categories, namely, 1) biometric-based authentication schemes, 2) channel-based authentication schemes, 3) factors-based authentication schemes, and 4) ID-based authentication schemes. In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in form of tables. Finally, we identify open challenges and future research directions.en
dc.funderNo external funderen
dc.identifier.citationFerrag, M. A., Maglaras, L., Derhab, A. and Janicke, H. (2019) Authentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issues. Telecommunication Systems,en
dc.identifier.doihttps://doi.org/10.1007/s11235-019-00612-5
dc.identifier.urihttps://www.dora.dmu.ac.uk/handle/2086/18411
dc.language.isoenen
dc.peerreviewedYesen
dc.publisherSpringeren
dc.researchinstituteCyber Technology Institute (CTI)en
dc.subjectAuthenticationen
dc.subjectSmart Mobile Devicesen
dc.subjectBiometricsen
dc.titleAuthentication schemes for Smart Mobile Devices: Threat Models, Countermeasures, and Open Research Issuesen
dc.typeArticleen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TELS_D_19_00099_R2 (2).pdf
Size:
1.35 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: