Digital Authentication Methodologies for Mobile Devices
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2021 by IJETT Journal|
|Year of Publication : 2021|
|Authors : Jyothy Joseph, Dr.K Nirmala
|DOI : 10.14445/22315381/IJETT-V69I1P211|
MLA Style: Jyothy Joseph, Dr.K Nirmala. "Digital Authentication Methodologies for Mobile Devices" International Journal of Engineering Trends and Technology 69.1(2021):74-80.
APA Style:Jyothy Joseph, Dr.K Nirmala. Digital Authentication Methodologies for Mobile Devices International Journal of Engineering Trends and Technology, 69(1), 74-80.
In the android mobile ecosphere, data loss and financial loss are the two potential threats facing the current epoch. Both threats have multiple subdivisions and impacts many of the mobile users and organizations. Many users are passionate and thrilled to use various new features introduced by various mobile companies and applications. Without properly evaluating the security capabilities and vulnerabilities, many of them use the various extensive features available in the system. By default, all the devices and applications have different levels of built-in security features, but many of them do not utilize this appropriately or are not aware of these in the right sense. This study has attempted to list the various secured authentication features available in different layers and the type of protection that enables these features. Here, the analyses chart security features in hierarchical order starting from device-level security and then moves on to the application level security and finally fragments itself into an activity or transaction level of security features.
 Sandeep Gupta, Attaullah Buriro, and Bruno Crispo (2018) [Ways and Types to Secure Access] https://www.hindawi.com/journals/misy/2018/2649598/
 Abdulaziz Alzubaidi and Jugal Kalita (2019) [Authentication of Smartphone Users Using Behavioral Biometrics] https://arxiv.org/pdf/1911.04104.pdf
 Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos (2012) [Progressive authentication] https://homes.cs.washington.edu/~kstrauss/publications/pa.pdf
 Matthew Haughn and Margaret Rose (2014) [Mobile authentication] https://searchsecurity.techtarget.com/definition/mobile-authentication
 John Powers (2019) [Authentication with modern methods] https://searchmobilecomputing.techtarget.com/feature/Tackle-mobile-device-authentication-with-modern-methods
 Secure Technology Alliance Mobile Council (2017) [Mobile Identity Authentication] https://www.securetechalliance.org/wp-content/uploads/Mobile-Identity-Authentication-WP-FINAL-March-2017.pdf
 Jim Haviland (2019) [Existing authentication options] https://insights.samsung.com/2019/09/06/which-authentication-method-is-best-for-your-business-phones/
 National Cyber Security Center UK (2020) [Mobile Device Guidance] https://www.ncsc.gov.uk/collection/mobile-device-guidance/enterprise-authentication-policy
 Robert Triggs [Two factor authentication] (2019) https://www.androidauthority.com/two-factor-authentication-explained-971653/
 Alice MJ (2020) [Screen lock] https://drfone.wondershare.com/unlock/android-lock-screen-settings.html
 Merry Marwig (2020) [Password less Authentication] https://research.g2.com/insights/guide-to-passwordless-authentication
 Android Central (2018) [Smart Lock] https://www.androidcentral.com/smart-lock
 Simon Hill (2018) [Smart Lock Working] https://www.digitaltrends.com/mobile/how-to-use-android-smart-lock/
 Dean Nicolls (2019) [Biometric Authentication] https://www.jumio.com/what-is-biometric-authentication/
 OneSpan (2020) [Multi Factor Authentication] https://www.onespan.com/topics/multi-factor-authentication.
Device Level Authentication, Application Level Authentication, Transaction Level Authentication, Biometric Authentication, Multi-Factor Authentication