EconPapers    
Economics at your fingertips  
 

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues

Mohamed Amine Ferrag (), Leandros Maglaras (), Abdelouahid Derhab () and Helge Janicke ()
Additional contact information
Mohamed Amine Ferrag: Guelma University
Leandros Maglaras: De Montfort University
Abdelouahid Derhab: King Saud University
Helge Janicke: De Montfort University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2020, vol. 73, issue 2, No 12, 317-348

Abstract: Abstract This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based attacks, combined eavesdropping and identity-based attacks, manipulation-based attacks, and service-based attacks. This is followed by a description of multiple existing threat models. We also provide a classification of countermeasures into four types of categories, including, cryptographic functions, personal identification, classification algorithms, and channel characteristics. According to the characteristics of the countermeasure along with the authentication model iteself, we categorize the authentication schemes for smart mobile devices in four categories, namely, (1) biometric-based authentication schemes, (2) channel-based authentication schemes, (3) factors-based authentication schemes, and (4) ID-based authentication schemes. In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in form of tables. Finally, we identify open challenges and future research directions.

Keywords: Security; Authentication; Smart mobile devices; Biometrics; Cryptography (search for similar items in EconPapers)
Date: 2020
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://link.springer.com/10.1007/s11235-019-00612-5 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:73:y:2020:i:2:d:10.1007_s11235-019-00612-5

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-019-00612-5

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:73:y:2020:i:2:d:10.1007_s11235-019-00612-5