Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Authentication of users on mobile telephones - A survey of attitudes and practices

Published: 01 October 2005 Publication History

Abstract

With the ever-increasing functionality and services accessible via mobile telephones, there is a strong argument that the level of user authentication implemented on the devices should be extended beyond the Personal Identification Number (PIN) that has traditionally been used. This paper presents the results of a survey of 297 mobile subscribers, which attempted to assess their use of mobile devices, their use of current authentication methods, and their attitudes towards future security options. The findings revealed that the majority of the respondents make significant use of their devices, with clear demands for protection against unauthorised use. However, the use of current PIN-based authentication is problematic, with a third of the respondents indicating that they do not use it at all, and other problems being reported amongst those that do. In view of this, the respondents' opinions in relation to future security options are interesting, with 83% being willing to accept some form of biometric authentication on their device. The discussion considers these findings, and the potential applicability of the preferred techniques to mobile devices.

References

[1]
<http://www.3gpp.org/ftp/Specs/html-info/21133.htm>
[2]
WAP makes resurgence. 8 January 2004. ZDNet, UK.
[3]
<http://www.cellular.co.za/news_2004/may/050104-mobile_content_shows_revenue_pro.htm>
[4]
<http://www.cellular.co.za/stats/stats-handsets.htm>
[5]
Acceptance of subscriber authentication methods for mobile telephony devices. Computers and Security. v21 i3. 220-228.
[6]
Clarke NL, Furnell SM, Reynolds PL. Biometric authentication for mobile devices. In: Proceedings of the third Australian information warfare and security conference, Perth, Western Australia; 28-29 November 2002b.
[7]
Clarke N, Furnell S, Lines B, Reynolds P. Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets. In: Proceedings of IFIP SEC 2003, Athens, Greece; 26-28 May 2003. p. 97-108.
[8]
<http://www.competition-commission.org.uk/rep_pub/reports/2003/475mobilephones.htm#full>
[9]
Harrington V, Mayhew P. Home office research study 235: mobile phone theft. Crown Copyright; 2001.
[10]
Biometrics market and industry report 2004-2008. International Biometric Group.
[11]
Which is the best biometric technology?. International Biometric Group.
[12]
<http://news.com.com/2009-1001-916719.html>
[13]
Mobile phone theft is far worse than we thought. The Register.
[14]
Biometric product testing final report. 19 March 2001. National Physical Laboratory, Middlesex, UK.
[15]
Password security: a case history. Communications of the ACM. v22 i11. 594-597.
[16]
Biometrics. Identity verification in a networked world. 2002. John Wiley & Sons.
[17]
<http://www.nttdocomo.com/corebiz/foma/try/900i/index.html>
[18]
Tomoko G. Biometrics as a privacy-enhancing technology: friend or foe of privacy. Privacy laws and business ninth privacy commissioners/data protection authorities workshop, Spain; 15 September 1998.
[19]
The use of passwords for controlled access to computer resources. May 1977. U.S Department of Commerce/NBS.

Cited By

View all
  • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
  • (2024)Willingness of sharing facial data for emotion recognition: a case study in the insurance marketAI & Society10.1007/s00146-023-01690-539:5(2373-2384)Online publication date: 1-Oct-2024
  • (2023)EarPPG: Securing Your Identity with Your EarsProceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581641.3584070(835-849)Online publication date: 27-Mar-2023
  • Show More Cited By
  1. Authentication of users on mobile telephones - A survey of attitudes and practices

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Computers and Security
      Computers and Security  Volume 24, Issue 7
      October, 2005
      82 pages

      Publisher

      Elsevier Advanced Technology Publications

      United Kingdom

      Publication History

      Published: 01 October 2005

      Author Tags

      1. Authentication
      2. Biometric
      3. Mobile
      4. PIN
      5. User survey

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
      • (2024)Willingness of sharing facial data for emotion recognition: a case study in the insurance marketAI & Society10.1007/s00146-023-01690-539:5(2373-2384)Online publication date: 1-Oct-2024
      • (2023)EarPPG: Securing Your Identity with Your EarsProceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581641.3584070(835-849)Online publication date: 27-Mar-2023
      • (2023)EmgAuth: Unlocking Smartphones With EMG SignalsIEEE Transactions on Mobile Computing10.1109/TMC.2022.317665122:9(5248-5261)Online publication date: 1-Sep-2023
      • (2022)A framework of dynamic selection method for user classification in touch-based continuous mobile device authenticationJournal of Information Security and Applications10.1016/j.jisa.2022.10321767:COnline publication date: 1-Jun-2022
      • (2022)Secure and Authentic Anonymous Roaming ServiceWireless Personal Communications: An International Journal10.1007/s11277-022-09579-0125:1(819-839)Online publication date: 1-Jul-2022
      • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
      • (2021)BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication SystemComputer Security. ESORICS 2021 International Workshops10.1007/978-3-030-95484-0_10(158-170)Online publication date: 4-Oct-2021
      • (2020)Knock, knock. who's there? on the security of LG's knock codesProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488908(37-59)Online publication date: 10-Aug-2020
      • (2020)A Survey on Mobile User Perceptions of Sensitive Data and Authentication MethodsProceedings of the 24th Pan-Hellenic Conference on Informatics10.1145/3437120.3437337(346-349)Online publication date: 20-Nov-2020
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media