[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3451471.3451503acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsimConference Proceedingsconference-collections
research-article

A Survey on Multi-Factor Authentication Methods for Mobile Devices

Published: 13 July 2021 Publication History

Abstract

The use of mobile devices worldwide has been on the increase. More and more people are using mobile devices to carry out activities on the Internet. The activities include checking emails, online banking, school, and work activities. However, mobile devices are susceptible to security risks and attacks. In this study, a survey was administered to 74 participants. The participants were asked whether they have multi-factor authentication on their mobile devices and if this feature is configured. Participants were also asked about how they use their mobile devices, how often they change their passwords, as well as their perception about the importance of mobile device security. The data collected from the participants was analyzed and results indicated that many participants strongly believe that mobile device security is important. Most of the participants use their mobile devices to check emails, conduct work activities, and online banking among other tasks. The results also indicate that nearly half of those who have devices that support multi-factor authentication do not use it. Furthermore, the results also show that nearly half of the participants have never changed the passwords on their mobile devices. The results may help organizations to educate people and raise the awareness of mobile device security. The results may also help with policy making.

References

[1]
Shukla, S. (2017). Editorial: Security of Mobile Devices. ACM Transactions on Embedded Computing Systems, 16(4), 1–2. https://doi.org/10.1145/3129534.
[2]
An, Y. (2012). Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards. Journal of Biomedicine & Biotechnology, 2012, 519723–519726. https://doi.org/10.1155/2012/519723.
[3]
Boonkrong, S. (2019). Security Analysis and Improvement of a Multi-Factor Biometric-Based Remote Authentication Scheme. IAENG International Journal of Computer Science, 46(4).
[4]
Mujeye, S, Levy, Y, Mattord, H, Li, W. (2016) Empirical Results of Password Strength and Cognitive Load. Online Journal of Applied Knowledge Management.
[5]
Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L. (2014). Robust Multi-Factor Authentication for Fragile Communications.  IEEE Transactions on Dependable and Secure Computing, 11(6), 568-581.
[6]
Pankhuri, Sinha, A., Shrivastava, G., & Kumar, P. (2019). A Pattern-Based Multi-Factor Authentication System. Scalable Computing. Practice and Experience, 20(1), 101–112. https://doi.org/10.12694/scpe.v20i1.1460.
[7]
Giwah, W., Wang, L., Levy, Y., & Hur, I. (2019). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory. Journal of Intellectual Capital, ahead-of-print(ahead-of-print). https://doi.org/10.1108/JIC-03-2019-0063Huang, X. (2014). Robust Multi-Factor Authentication for Fragile Communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568–581. https://doi.org/10.1109/tdsc.2013.2297110.
[8]
Chin, A. G., Little, P., & Jones, B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University. International Journal of Education & Development Using Information & Communication Technology, 16(1), 44–61.
[9]
Ehatisham-ul-Haq, A. (2017). Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors (Basel, Switzerland), 17(9), 2043–. https://doi.org/10.3390/s17092043.
[10]
Zaidi, S. F., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A Survey on Security for Smartphone Device. International Journal of Advanced Computer Science and Applications(IJACSA), 7(4), http://dx.doi.org/10.14569/IJACSA.2016.070426.
[11]
Heisler, Y. (2016). Mobile internet usage surpasses desktop usage for the first time in history. Retrieved November 14, 2020, from https://bgr.com/2016/11/02/internet-usage-desktop-vsmobile/.
[12]
Senft, D. (2013). Mobile devices: Technology aid—security risk. Geriatric Nursing (New York), 34(2), 149–150. https://doi.org/10.1016/j.gerinurse.2013.02.005.
[13]
Hintze, F. (2019). CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3), 1–23. https://doi.org/10.1145/3351243.
[14]
Ranak, M. S. A. N., Azad, S., Nor, N. N. H. B. M., & Zamli, K. Z. (2017). Press touch code: A finger press based screen size independent authentication scheme for smart devices. PLoS ONE, 12(10), 1–20. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0186940.
[15]
Grindrod, K., Khan, H., Hengartner, U., Ong, S., Logan, A. G., Vogel, D., Gebotys, R., & Yang, J. (2018). Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE, 13(1), 1–16. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0189048.
[16]
Taheri, Y. (2018). A Cross-Layer Biometric Recognition System for Mobile IoT Devices. Electronics (Basel), 7(2), 26–. https://doi.org/10.3390/electronics7020026.
[17]
Bakshi, S., Sa, P. K., Wang, H., Barpanda, S. S., & Majhi, B. (2018). Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimedia Tools and Applications, 77(14), 17595-17623.
[18]
Gupta, E., Agrwal, M., & Sivakumar, R. (2020). Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals. ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 1–6. https://doi.org/10.1109/ICC40277.2020.9148741.
[19]
Garcia-Martin, R., & Sancez-Reillo, R. (2020). Vein Biometric Recognition on a Smartphone. IEEE Access, 8, 104801–104813. https://doi.org/10.1109/ACCESS.2020.3000044.
[20]
Braeken, A., Kumar, P., Liyanage, M., & Hue, T. T. K. (2018). An efficient anonymous authentication protocol in multiple server communication networks (EAAM). Journal of Supercomputing, 74(4), 1695–1714. https://doi-org.libproxy.lib.ilstu.edu/10.1007/s11227-017-2190-8.
[21]
Dasgupta, D., Roy, A., & Nag A. (2017). Adaptive Multi-factor Authentication: Bring dynamicity in multi-factor authentication process. In Advances in User Authentication (pp. 281–355). Springer International Publishing. https://doi.org/10.1007/978-3-319-58808-7_7.
[22]
Knight, P. (2005). The Changing Demographics: The Diminishing Role of Age and Gender in Computer Usage. Journal of Organizational and End User Computing (JOEUC), 17(4), 49–65. https://doi.org/10.4018/joeuc.2005100103.

Cited By

View all
  • (2024)CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and PasswordsApplied Sciences10.3390/app1412501914:12(5019)Online publication date: 8-Jun-2024
  • (2022)A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)10.1109/PKIA56009.2022.9952258(1-8)Online publication date: 9-Sep-2022

Index Terms

  1. A Survey on Multi-Factor Authentication Methods for Mobile Devices
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICSIM '21: Proceedings of the 2021 4th International Conference on Software Engineering and Information Management
        January 2021
        251 pages
        ISBN:9781450388955
        DOI:10.1145/3451471
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 July 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Mobile device security
        2. authentication
        3. biometrics
        4. multi-factor authentication
        5. password

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICSIM 2021

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)79
        • Downloads (Last 6 weeks)6
        Reflects downloads up to 30 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and PasswordsApplied Sciences10.3390/app1412501914:12(5019)Online publication date: 8-Jun-2024
        • (2022)A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)10.1109/PKIA56009.2022.9952258(1-8)Online publication date: 9-Sep-2022

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media