IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Biometric Authentication Schemes and Methods on Mobile Devices: A Systematic Review

Biometric Authentication Schemes and Methods on Mobile Devices: A Systematic Review
View Sample PDF
Author(s): Akon Obu Ekpezu (Cross River University of Technology, Cross River, Nigeria), Enoima Essien Umoh (Cross River University of Technology, Nigeria), Felix Nti Koranteng (University of Education, Winneba, Kumasi Campus, Ghana)and Joseph Ahor Abandoh-Sam (Valley View University, Ghana)
Copyright: 2020
Pages: 21
Source title: Modern Theories and Practices for Cyber Ethics and Security Compliance
Source Author(s)/Editor(s): Winfred Yaokumah (University of Ghana, Ghana), Muttukrishnan Rajarajan (City University of London, UK), Jamal-Deen Abdulai (University of Ghana, Ghana), Isaac Wiafe (University of Ghana, Ghana)and Ferdinand Apietu Katsriku (University of Ghana, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch011

Purchase

View Biometric Authentication Schemes and Methods on Mobile Devices: A Systematic Review on the publisher's website for pricing and purchasing information.

Abstract

Due to the sensitivity and amount of information stored on mobile devices, the need to protect these devices from unauthorized access has become imperative. Among the various mechanisms to manage access on mobile devices, this chapter focused on identifying research trends on biometric authentication schemes. The systematic literature review approach was adopted to guide future researches in the subject area. Consequently, seventeen selected articles from journals in three databases (IEEE, ACM digital library, and SpringerLink) were reviewed. Findings from the reviewed articles indicated that touch gestures are the predominant authentication technique used in mobile devices, particularly in android devices. Furthermore, mimic attacks were identified as the commonest attacks on biometric authentic schemes. While, robust authentication techniques such as dental occlusion, ECG (electrocardiogram), palmprints and knuckles were identified as newly implemented authentication techniques in mobile devices.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom