Currently,mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for example, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized access. The current operating systems of mobile smart phones offer different authentication mechanisms. Nonetheless, in some situations, these mechanisms are vulnerable and in other situations, they are not user friendly enough, thus not widely adopted. In this chapter,wewill give an overviewof the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment. In addition, the pro and cons of these techniques will be highlighted. Moreover, a comparison among these techniques will be conducted. The chapter also discuss the other techniques which could much suitable for the current environment of the mobile applications. Furthermore, it discuss a number of open issues of the mobile authentication which needs further research in the future to improve the adoption of the biometric authentication in the smartphones environment.
CITATION STYLE
Amin, R., Gaber, T., Eltaweel, G., & Hassanien, A. E. (2015). Biometric and traditional mobile authentication techniques: Overviews and open issues. Intelligent Systems Reference Library, 70, 423–446. https://doi.org/10.1007/978-3-662-43616-5_16
Mendeley helps you to discover research relevant for your work.