UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :Article
Subject :T Technology (General)
ISBN :2307-1877
Main Author :Garfan, Salem Abdullah Salem
Title :Sensor-based authentication in smartphone: A systematic review
Hits :82
Place of Production :Tanjung Malim
Publisher :Fakulti Komputeran & Meta-Teknologi
Year of Publication :2024
Notes :Journal of Engineering Research (Kuwait)
Corporate Name :Universiti Pendidikan Sultan Idris
HTTP Link : Click to view web link
PDF Full Text :You have no permission to view this item.

Abstract : Universiti Pendidikan Sultan Idris
With the widespread usage of smartphones, users not just using their smartphone for calls and messaging only, but they are using it for a variety of purposes such as banking transactions, e-mailing, chatting, online shopping, video conferencing, health monitoring, and many more. Most of these activities store personal and sensitive data of the user on the device, reaching this confidential information by unauthorized person may cause huge losses and bad consequences. Therefore, securing the smartphone's accessibility from unauthorized people became an extremely essential. With the advanced development in the area of sensor-based smartphone authentication methods, different methods were developed to be easily used by users through specific criteria. However, many aspects haven't been discovered yet in the area of sensor-based smartphone authentication methods. On the basis of that, this study aims to review the area of sensor-based smartphone authentication methods systematically to provide a comprehensive understanding of this new area and to discuss the current challenges and issues. To conduct this systematic review, four scientific digital databases were utilized; ScienceDirect, IEEE Xplore, Web of Science, and Scopus. The total number of studies found was n = 256 articles, only n = 46 articles were included based on our inclusion criteria. To provide a comprehensive understanding of the included studies, taxonomy was drawn. Also, this study provides a discussion on the current motivations, challenges and issues, and recommendations in sensor-based smartphone authentication methods. This review enlightens, encourage, and direct researchers to develop authentication solutions and reduce the current gaps in this area. © 2024 The Authors

References

M.L. Shuwandy, B.B. Zaidan, A.A. Zaidan, Novel authentication of blowing voiceless password for android smartphones using a microphone sensor, Multimed. Tools Appl. 81 (30) (2022) 44207–44243.

S. Gupta, A. Buriro, B. Crispo, Demystifying authentication concepts in smartphones: ways and types to secure access (vol), Mob. Inf. Syst. 2018 (2018), https://doi.org/10.1155/2018/2649598.

M.L. Shuwandy, “Smile Mask to Capsulation MOLAZ Method,” IJCSNS Int. J. Comput. Sci. Netw. Secur., no. July, 2013, [Online]. Available: http://paper.ijcsns. org/07_book/201312/20131210.pdf.

M.L. Shuwandy, B.B. Zaidan, A.A. Zaidan, A.S. Albahri, Sensor-based mhealth authentication for real-time remote healthcare monitoring system: a multilayer systematic review, J. Med. Syst. vol. 43 (2) (2019), https://doi.org/10.1007/s10916-018-1149-5.

M.S. Obaidat, I. Traore, and I. Woungang, Biometric- Based Physical and Cybersecurity Systems.

L. Hern´andez-´alvarez, J.M. de Fuentes, L. Gonz´alez-Manzano, L.H. Encinas, Privacy-preserving sensor-based continuous authentication and user profiling: a review, Sens. (Switz. ) vol. 21 (1) (2021) 1–23, https://doi.org/10.3390/s21010092.

Shuwandy, Moceheb Lazam, H. A. Aljubory, N. M. Hammash, M. M. Salih, M. A. Altaha, and Z. T. Alqaisy. "BAWS3TS: Browsing Authentication Web-Based Smartphone Using 3D Touchscreen Sensor." In 2022 IEEE 18th International Colloquium on Signal Processing & Applications (CSPA), pp. 425-430. IEEE, 2022.

T. Osman, M. Mannan, U. Hengartner, A. Youssef, Appveto: mobile application selfdefense through resource access veto, ACM Int. Conf. Proceeding Ser, 2019, pp. 366–377, https://doi.org/10.1145/3359789.3359839.

D.M. Shila and E. Eyisi, “Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks,” Proc. - 17th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. 12th IEEE Int. Conf. Big Data Sci. Eng. Trust. 2018, pp. 316–321, 2018, doi:10.1109/TrustCom/BigDataSE.2018.00055.

J. Zhang, A.R. Beresford, and I. Sheret, “SensorID: Sensor calibration fingerprinting for smartphones,” in Proceedings - IEEE Symposium on Security and Privacy, 2019, vol. 2019-May, pp. 638–655, doi: 10.1109/SP.2019.00072.

J.M. de Fuentes, L. Gonzalez-Manzano, A. Ribagorda, Secure and usable user-in-acontext continuous authentication in smartphones leveraging non-assisted sensors, Sens. (Switz. ) vol. 18 (4) (2018), https://doi.org/10.3390/s18041219.

M.L. Shuwandy, A.K. Salih, F.L.K. Alameen, A.M.M. Habbal, Switching between the AES-128 and AES-256 using Ks * & two keys, IJCSNS Int. J. Comput. Sci. Netw. Secur. vol. 10 (8) (2010) 136–139 ([Online]. Available), http://paper.ijcsns.org/07_book/201008/20100821.pdf.

R. Wang and D. Tao, “DTW-KNN Implementation for Touch-based Authentication System,” Proc. - 5th Int. Conf. Big Data Comput. Commun. BIGCOM 2019, pp. 318–322, 2019, doi: 10.1109/BIGCOM.2019.00055.

D. Shukla, G. Wei, D. Xue, Z. Jin, V.V. Phoha, Bodytaps: authenticating your device through few simple taps, 2018 IEEE 9th Int. Conf. Biom. Theory, Appl. Syst. BTAS 2018 (2018) 1–8, https://doi.org/10.1109/BTAS.2018.8698602.

R.Blanco Gonzalo et al., “Attacking a Smartphone Biometric Fingerprint System: A Novice’s Approach,” Proc. - Int. Carnahan Conf. Secur. Technol. , vol. 2018-Octob, no. 675087, pp. 1–5, 2018, doi: 10.1109/CCST.2018.8585726.

C. Lunerti, R. Guest, J. Baker, P. Fernandez-Lopez, and R. Sanchez-Reillo, “Sensing Movement on Smartphone Devices to Assess User Interaction for Face Verification,” Proc. - Int. Carnahan Conf. Secur. Technol., vol. 2018-Octob, pp. 1–5, 2018, doi: 10.1109/CCST.2018.8585547.

K. Yoneda, G.M. Weiss, Mobile sensor-based biometrics using common daily activities (Janua), 2017 IEEE 8th Annu. Ubiquitous Comput. Electron. Mob. Commun. Conf. UEMCON 2017 vol. 2018 (2017) 584–590, https://doi.org/10.1109/UEMCON.2017.8249001.

Z. Akhtar, A. Buriro, B. Crispo, and T.H. Falk, “Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns,” 2017 IEEE Glob. Conf. Signal Inf. Process. Glob. 2017 - Proc., vol. 2018-Janua, pp. 1368–1372, 2018, doi: 10.1109/GlobalSIP.2017.8309185.

H. Ketabdar, P. Moghadam, B. Naderi, M. Roshandel, Magnetic signatures in air for mobile devices, MobileHCI’12 - Companion Proc. 14th Int. Conf. Hum. Comput. Interact. Mob. Devices Serv. (2012) 185–188, https://doi.org/10.1145/


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to search page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.