Digital Authentication Methodologies for Mobile Devices

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2021 by IJETT Journal
Volume-69 Issue-1
Year of Publication : 2021
Authors : Jyothy Joseph, Dr.K Nirmala
DOI :  10.14445/22315381/IJETT-V69I1P211

Citation 

MLA Style: Jyothy Joseph, Dr.K Nirmala. "Digital Authentication Methodologies for Mobile Devices" International Journal of Engineering Trends and Technology 69.1(2021):74-80. 

APA Style:Jyothy Joseph, Dr.K Nirmala. Digital Authentication Methodologies for Mobile Devices  International Journal of Engineering Trends and Technology, 69(1), 74-80.

Abstract
In the android mobile ecosphere, data loss and financial loss are the two potential threats facing the current epoch. Both threats have multiple subdivisions and impacts many of the mobile users and organizations. Many users are passionate and thrilled to use various new features introduced by various mobile companies and applications. Without properly evaluating the security capabilities and vulnerabilities, many of them use the various extensive features available in the system. By default, all the devices and applications have different levels of built-in security features, but many of them do not utilize this appropriately or are not aware of these in the right sense. This study has attempted to list the various secured authentication features available in different layers and the type of protection that enables these features. Here, the analyses chart security features in hierarchical order starting from device-level security and then moves on to the application level security and finally fragments itself into an activity or transaction level of security features.

Reference
[1] Sandeep Gupta, Attaullah Buriro, and Bruno Crispo (2018) [Ways and Types to Secure Access] https://www.hindawi.com/journals/misy/2018/2649598/
[2] Abdulaziz Alzubaidi and Jugal Kalita (2019) [Authentication of Smartphone Users Using Behavioral Biometrics] https://arxiv.org/pdf/1911.04104.pdf
[3] Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos (2012) [Progressive authentication] https://homes.cs.washington.edu/~kstrauss/publications/pa.pdf
[4] Matthew Haughn and Margaret Rose (2014) [Mobile authentication] https://searchsecurity.techtarget.com/definition/mobile-authentication
[5] John Powers (2019) [Authentication with modern methods] https://searchmobilecomputing.techtarget.com/feature/Tackle-mobile-device-authentication-with-modern-methods
[6] Secure Technology Alliance Mobile Council (2017) [Mobile Identity Authentication] https://www.securetechalliance.org/wp-content/uploads/Mobile-Identity-Authentication-WP-FINAL-March-2017.pdf
[7] Jim Haviland (2019) [Existing authentication options] https://insights.samsung.com/2019/09/06/which-authentication-method-is-best-for-your-business-phones/
[8] National Cyber Security Center UK (2020) [Mobile Device Guidance] https://www.ncsc.gov.uk/collection/mobile-device-guidance/enterprise-authentication-policy
[9] Robert Triggs [Two factor authentication] (2019) https://www.androidauthority.com/two-factor-authentication-explained-971653/
[10] Alice MJ (2020) [Screen lock] https://drfone.wondershare.com/unlock/android-lock-screen-settings.html
[11] Merry Marwig (2020) [Password less Authentication] https://research.g2.com/insights/guide-to-passwordless-authentication
[12] Android Central (2018) [Smart Lock] https://www.androidcentral.com/smart-lock
[13] Simon Hill (2018) [Smart Lock Working] https://www.digitaltrends.com/mobile/how-to-use-android-smart-lock/
[14] Dean Nicolls (2019) [Biometric Authentication] https://www.jumio.com/what-is-biometric-authentication/
[15] OneSpan (2020) [Multi Factor Authentication] https://www.onespan.com/topics/multi-factor-authentication.

Keywords
Device Level Authentication, Application Level Authentication, Transaction Level Authentication, Biometric Authentication, Multi-Factor Authentication