Please use this identifier to cite or link to this item: http://41.63.8.17:80/jspui/handle/123456789/200
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKunda, Douglas-
dc.contributor.authorChishimba, Mumbi-
dc.date.accessioned2023-11-14T09:15:07Z-
dc.date.available2023-11-14T09:15:07Z-
dc.date.issued2021-12-
dc.identifier.urihttp://41.63.8.17:80/jspui/handle/123456789/200-
dc.description.abstractThe Android operating system is the most popular mobile operating system resulting in a great number of applications being developed for the platform. This makes them vulnerable to security threats such as social engineering, shoulder surfing and Malware. Therefore, Android devices require a secure authentication scheme in order to control access to the device. This paper briefly discusses the mobile security threats, the authentication protocols and Android Security. Then the paper presents an analysis of some of the authentication schemes that are used in mobile devices and some of the threats and technical issues faced. Authentication schemes discussed include password/pin, pattern based authentication, fingerprint recognition, facial recognition, vocal recognition and iris based authentication. In discussing the various authentication methods, it was observed that while biometric based authentication schemes offered the greatest level of security, there was always a trade-off between computational complexity and ease of use/implementation/cost that ensured that more traditional authentication schemes, while not as secure as biometric schemes, are still widely used in mobile devices.en_US
dc.language.isoenen_US
dc.publisherMobile Networks and Applicationsen_US
dc.subjectAndroiden_US
dc.subjectmobile phoneen_US
dc.subjectAuthenticationen_US
dc.subjectSchemesen_US
dc.titleA Survey of Android Mobile Phone Authentication Schemesen_US
dc.typeArticleen_US
Appears in Collections:Research Papers and Journal Articles

Files in This Item:
File Description SizeFormat 
A Survey of Android Mobile Phone Authentication Schemes.pdf305.1 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.