Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel and Efficient Mobile Device Authentication Architecture

M. Suresh Thangakrishnan, M. Prabukumar

Abstract


The modern world runs with an express speed. Starting from the exchange of information till the money transfer is done in a fraction of second. It’s due to the machine which governs the activities in the world. The machine cannot discriminate a legitimate and an illegitimate user, unless if it is trained. Strong and extensive passwords always consigns to oblivion. So for accessing the user accounts through mobile devices we provide an authenticated service to the users without the password reminisce.

Keywords


Authentication, IMEI, Keystroke biometrics, TMAT.

Full Text:

PDF

References


Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza.”Passwordless Login System for Mobile Phones Using CAPTCHA” 49th International Symposium ELMAR-2007, 12-14 September 2007, Zadar, Croatia.

X.Ke, R.Manuel, M. Wilkerson, and L.Jin. “Keystroke Dyamics: A Web-based Biometric solution.” 13th USENIX Security Symposium.

R. Joyce and G. Gupta. “Identity Authentication Based on Keystroke Latencies.”ACM, Vol. 33, No. 2, p168-176, 1990.

F.Bergadano, D. Gunetti, and C. Picardi. ”User Authentication through Keystroke Dynamics.” ACM. Transactions on Information and System Security, Vol. 5, No. 4, Nov., p. 367-397, 2002.

B.Schneier,”The Use & Abuses of Biometrics”, ACM, 42(8) pp 136, 1999.

Chen GD, Chang CK, Wang CY. “Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques,” Computers & Education, 50(1), 77–90, 2008.

Clarke N, Furnell S., “Authentication of users on mobile telephones a survey of attitudes and practices,” Computers & Security, 24(7), 519–27, 2005.

Clarke N, Furnell S, “Advanced user authentication for mobile Devices,” Computers & Security 26(2), 109–19, 2007.

Clarke N, Furnell S, “Authenticating mobile phone users using keystroke analysis,” International Journal of Information Security, 6(1), 1–14, 2007.

Umphress D, Williams G, “Identity verification through keyboard characteristics,” International Journal of Man Machine Studies, 23,263–73, 1985.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.