Filters








19,102 Hits in 6.0 sec

Biometric authentication for mobile government security

Thamer Alhussain, Steve Drew, Osama Alfarraj
2010 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems  
With the rapid growth of mobile devices and Internet services, there is a growing need for user and government authentication for the protection of data and services, and to promote public trust.  ...  Mobile government provides unique opportunities to utilize mobile technology to receive government services and information literally from any place, at any time, using varieties of wireless networks.  ...  Data includes users', service providers', and network operators' concerns and perceptions regarding the application of biometric authentication into mobile devices for government services.  ... 
doi:10.1109/icicisys.2010.5658854 fatcat:nq5ivuwu2vdsvedvdqu6sbdf6m

BAMCloud: A Cloud Based Mobile Biometric Authentication Framework [article]

Farhana Javed Zareen, Kashish Ara Shakil, Mansaf Alam, Suraiya Jabin
2017 arXiv   pre-print
The main reason for biometric technologies becoming more common in the everyday lives of consumers is because of the facility to easily capture biometric data in real time, using their mobile phones.  ...  For this purpose we have implemented it using MapReduce on Hadoop platform and for training Levenberg-Marquardt backpropagation neural network has been used.  ...  It is further acknowledged that Farhana Javed Zareen and Kashish Ara Shakil share equal contributions for the work carried out in this article.  ... 
arXiv:1601.02781v2 fatcat:22zdiog75rhuvlvgcs7sggxxc4

Data mining in mobile ECG based biometric identification

Khairul Azami Sidek, Vu Mai, Ibrahim Khalil
2014 Journal of Network and Computer Applications  
Therefore, these outcomes support the usability of ECG based biometric identification in a mobile environment.  ...  This paper investigates the robustness of performing biometric identification in a mobile environment using electrocardiogram (ECG) signals.  ...  networks on mobile devices.  ... 
doi:10.1016/j.jnca.2014.04.008 fatcat:t4kvopawhjhm5fbzdrlemzcaxq

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends [article]

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab
2019 arXiv   pre-print
The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided.  ...  Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented.  ...  [32] , a deep convolutional neural network is proposed for mobile IoT devices.  ... 
arXiv:1901.09374v1 fatcat:tglfqlpnczhufoutjae6ogunz4

Performance Evaluation of Mobile Sensor for Context Awareness User Authentication

Eniola S. Adewumi, Timibloudi S. Enamamu, Aliyu A. Dahiru
2022 Zenodo  
The mobile data used includes gyroscope, accelerometer, linear accelerometer, proximity, gravity, and magnetometer sensor data. A feedforward neural network was used for data classification.  ...  These sensors can be leveraged upon as a solution for user authentication. This research analyzed and evaluated different mobile device sensors for continuous and transparent user authentication.  ...  Furthermore, from the analysis of most sensors on mobile devices, sensory data can be in a continuous manner if the mobile device is being used.  ... 
doi:10.5281/zenodo.6763156 fatcat:vsg7ertrkfekfc2pefmthba4ji

Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory [chapter]

Thamer Alhussain, Steve Drew
2012 Security Enhanced Applications for Information Systems  
the 3G case, for the mobile device to authenticate the access network.  ...  providers', and network operators' about applying biometric authentication into mobile devices for government services.  ...  Developing a Theoretical Framework for the Adoption of Biometrics in M-Government Applications Using Grounded Theory, Security Enhanced Applications for Information Systems, Dr.  ... 
doi:10.5772/36881 fatcat:pc5unrvazzfullgjwwgp7a3w64

Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones

Dina EL, Hoda M., Osman Hegazy
2012 International Journal of Advanced Computer Science and Applications  
Thus, stronger identification is needed to ensure data security and privacy. In this paper, we will explain the employment of biometrics to computer and mobile platforms.  ...  Finally, we propose an authentication scheme for smart phones that shows positive results.  ...  ACKNOWLEDGMENT We would like to thank Professor Walter Beagley, Professor of Psychology at Alma College for letting us use the Eye Lines Program to collect the data.  ... 
doi:10.14569/ijacsa.2012.031017 fatcat:rauczqen5jhcfo5cklwtonnuu4

Users" Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia

Thamer Alhussain, Rayed AlGhamdi, Salem Alkhalaf, Osama Alfarraj
2013 Journal of clean energy technologies  
With the rapid growth of mobile phone devices, there is a growing need for user authentication for the protection of data and services, and to promote public trust.  ...  The results show that applying biometric authentication can meet the users' requirements for protecting sensitive information on their mobile device.  ...  DATA ANALYSIS AND DISCUSSION The Statistical Package for Social Sciences (SPSS) software was used to accomplish the statistical analysis of the 311 questionnaires.  ... 
doi:10.7763/ijcte.2013.v5.798 fatcat:dvzotpmyobgr7iwcmpjhockqua

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Mohamed Amine Ferrag, Leandros Maglaras, Abdelouahid Derhab
2019 Security and Communication Networks  
The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided.  ...  Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented.  ...  [33] , a deep convolutional neural network is proposed for mobile IoT devices.  ... 
doi:10.1155/2019/5452870 fatcat:wvabztvuvndoloe3p2gyvoy5ha

Continuous user authentication using multi-modal biometrics

Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
2015 Computers & security  
The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks.  ...  This research investigated three behavioural biometric techniques based on SMS texting activities and messages, looking to apply these techniques as a multi-modal biometric authentication method for mobile  ...  data was utilised for training the neural network.  ... 
doi:10.1016/j.cose.2015.06.001 fatcat:as4gtrnngbgmlmcay27kvezeba

A Novel Biometric Identification Based on a User's Input Pattern Analysis for Intelligent Mobile Devices

Hojin Seo, Eunjin Kim, Huy Kang Kim
2012 International Journal of Advanced Robotic Systems  
The existing physical and behavioural biometric identification methods -looked upon as good alternatives -are unsuitable for the current mobile environment.  ...  This paper proposes a specially designed biometric identification method for intelligent mobile devices by analysing the user's input patterns, such as a finger's touch duration, pressure level and the  ...  We foresee that the mobile environment and device techniques will have greater diversity in the near future, and thus this work can be expanded in many areas that use intelligent mobile devices.  ... 
doi:10.5772/51319 fatcat:k7xpvk3o4raznidabif2jq4zkq

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

Jongkil Jay Jeong, Yevhen Zolotavkin, Robin Doss
2022 ACM Computing Surveys  
Through a Citation Network Analysis (CNA), we identified that there are currently three primary focus research areas on CA - Keystroke Dynamics; Mouse Movements; and Mobile Device Touch, as well as identify  ...  This study also highlights the current gaps in the literature such as the need for a consensus over how to evaluate the application and utility of CA, and the need to examine the feasibility of CA technologies  ...  For item 4, VOSviewer -a software tool for creating maps to visualise and explore network data was utilised to build a network based on citation relations obtained as per item 3 [106] .  ... 
doi:10.1145/3533705 fatcat:ost6hf44xrdznolmmrxzvk4mgi

A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions

Christos K. Dimitriadis, Siraj A. Shaikh
2007 International Journal of Network Security  
BIO3G provides real end-to-end strong user authentication to the mobile operator, requiring no storing or transferring of biometric data and eliminating the need for biometric enrolment and administration  ...  This paper describes a protocol, called BIO3G, for establishing secure and privacy friendly biometric authentication in 3G mobile environments.  ...  The analysis indicated that biometric data should not be stored, neither by the mobile operator, or the UMTS Subscriber Identity Module (USIM), or user equipment.  ... 
dblp:journals/ijnsec/DimitriadisS07 fatcat:7b7iwuctafhtta3ijnn6ghmtp4

A critical insight into the identity authentication systems on smartphones

Tehseen Mehraj, Mir Aman Sheheryar, Sajaad Ahmed Lone, A. H. Mir
2019 Indonesian Journal of Electrical Engineering and Computer Science  
<span>The advancement of computing power on mobile devices and their popularity among people in performing sensitive data exchange is uncovering an urgent need for a highly secure solution than the existing  ...  In this paper, a survey based on various biometric and non-biometric access management schemes has been performed.  ...  In [46] , sensitive data leakage prevention mechanism for Android mobile devices has been proposed.  ... 
doi:10.11591/ijeecs.v13.i3.pp982-989 fatcat:7xz3hiialnfjzjkd77evwnqtg4

NOISE RESISTANCE OF REMOTE AUTHENTICATION VIA LTE NETWORK

Andrii Astrakhantsev, Galyna Liashenko, Anna Shcherbak
2020 Information and Telecommunication Sciences  
These networks provide high-quality mobile services and have increased transmission rates and often used for remote biometric authentication, but the influence of noise and fading in wireless channels  ...  We use computer simulation of biometric authentication system for preparing biometric template and Matlab models of wireless communication channel using the LTE technology for analysis of influence of  ...  Fig. 1 1 Сomparison of biometric authentication methods based on multi-criteria analysis Fig. 2 2 Preparing biometric data for transmission Fig. 3 3 Dependence of BER on the SNR value at different  ... 
doi:10.20535/2411-2976.22020.38-43 fatcat:bkwxvzyta5adnnonesvzu7nrhi
« Previous Showing results 1 — 15 out of 19,102 results