Device- versus Network-Centric Authentication Paradigms for Mobile Devices:

作者: S. M. Furnell , S. Karatzouni , N. L. Clarke

DOI:

关键词:

摘要: The increasing capability and functionality of mobile devices is leading to a corresponding increase in the need for security prevent unauthorised access. Indeed, as data services accessed via become more sensitive, existing method user authentication (predominately based upon Personal Identification Numbers) appears increasingly insufficient. An alternative basis offered by biometric approaches; which have potential be implemented non-intrusive manner also enable applied an ongoing manner, beyond initial point-of-entry. However, implementation any mechanism, particularly approaches, introduces considerations where main elements (such processing data, decisions making, storing templates/profiles) should reside. At extremes, there are two alternatives: device-centric paradigm, aforementioned aspects handled locally; or network-centric actions occur remotely under jurisdiction network operator. This paper examines alternatives determines that each context relation privacy storage bandwidth demands, service availability. In view various advantages disadvantages, it concluded hybrid approach represents most feasible solution; enabling split between locations depending individual circumstances. flexible approach, will architecture adaptable needs different users, requirements.

参考文章(7)
Binh Thai, Rachel Wan, Aruna Seneviratne, Thierry Rakotoarivelo, Integrated personal mobility architecture: a complete personal mobility solution Mobile Networks and Applications. ,vol. 8, pp. 27- 36 ,(2003) , 10.1023/A:1021115610456
Michael Thieme, Nanavati Raj, Samir Nanavati, Raj Nanavati, Biometrics: Identity Verification in a Networked World ,(2002)
N.L. Clarke, S.M. Furnell, P.M. Rodwell, P.L. Reynolds, Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices Computers & Security. ,vol. 21, pp. 220- 228 ,(2002) , 10.1016/S0167-4048(02)00304-8
Steven Furnell, Konstantinos Evangelatos, Public awareness and perceptions of biometrics Computer Fraud & Security. ,vol. 2007, pp. 8- 13 ,(2007) , 10.1016/S1361-3723(07)70006-4
Dorothy Denning, Information warfare and security Edpacs. ,vol. 27, pp. 1- 2 ,(1998) , 10.1201/1079/43255.27.9.20000301/30321.7
N. L. Clarke, S. M. Furnell, Authenticating mobile phone users using keystroke analysis International Journal of Information Security. ,vol. 6, pp. 1- 14 ,(2006) , 10.1007/S10207-006-0006-6
Pat Mayhew, Victoria Harrington, Mobile phone theft ,(2001)