Hybrid authentication systems: towards robust user authentication on wireless and mobile devices using biometric technologies

Bencheikh, R. and Vasiu, L. 2005. Hybrid authentication systems: towards robust user authentication on wireless and mobile devices using biometric technologies. 3rd International Workshop in Wireless Security Technologies (IWWST'05). London, UK 04-05 Apr 2005

TitleHybrid authentication systems: towards robust user authentication on wireless and mobile devices using biometric technologies
AuthorsBencheikh, R. and Vasiu, L.
TypeConference paper
Abstract

Adequate user authentication is a persistent problem, particularly with mobile devices, which tend to be highly personal and at the fringes of an organisation's influence. Yet these devices are being used increasingly in various business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defence for a mobile device that falls into the hands of an unauthorised user. However, motivating users to enable simple password mechanisms and periodically update their authentication information is difficult at best. This paper examines some of the issues relating to the use of biometrics as a viable method of authentication on mobile wireless devices. It is also a critical analysis of some of the techniques currently employed and where appropriate, suggests novel hybrid ways in which they could be improved or modified. Both biometric technology and wireless setting based constraints that determine the feasibility and the performance of the authentication feature are specified. Some well known biometric technologies are briefly reviewed and their feasibility for wireless and mobile use is reviewed. Furthermore, a number of quantitative and qualitative parameters for evaluation are also presented. Biometric technologies are continuously advancing toward commercial implementation in wireless devices. When carefully designed and implemented, the advantage of biometric authentication arises mainly from increased convenience and coexistent improved security.

KeywordsUser authentication, biometrics, e-commerce, wireless, mobile, security
Year2005
Conference3rd International Workshop in Wireless Security Technologies (IWWST'05)
Publication dates
Published2005
Web address (URL) of conference proceedingshttp://www.iwwst.org.uk/Files/2005/Proceedings2005.pdf

Related outputs

A requirement for a XML Web services security architecture
Vasiu, L. and Donciulescu, C. 2004. A requirement for a XML Web services security architecture. 6th International Conference on Enterprise Information Systems. Porto, Portugal 14-17 Apr 2004

Using the WSMA architecture for discovering Web services dynamically
Vasiu, L. and Conciulescu, C. 2004. Using the WSMA architecture for discovering Web services dynamically. in: Proceedings of the 2nd International Workshop for Wireless Security Technologies London, UK Middlesex University. pp. 89-92

Web services paradigm
Vasiu, L. 2004. Web services paradigm. Cutter Consortium's Enterprise Architecture Executive Update. 5 (6).

Towards an alternative way of verifying proxy objects in Jini
Papamichail, N. and Vasiu, L. 2004. Towards an alternative way of verifying proxy objects in Jini. in: Proceedings of ICETE 2004: 1st International Conference on E-Business and Telecommunication Networks, Setubal, Portugal, August 24-28, 2004 INSTICC Press. pp. 68-75

Enhancing security in Jini networking technology
Papamichail, N. and Vasiu, L. 2004. Enhancing security in Jini networking technology. 2004 IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR 2004 (THETA 14). Cluj-Napoca, Romania 13-15 May 2004

A solution for providing pseudo dynamic discovery for XML Web services
Donciulescu, C. and Vasiu, L. 2004. A solution for providing pseudo dynamic discovery for XML Web services. 2004 IEEE-TCCC International Conference on Automation, Quality & Testing, Robotics, AQTR 2004 (THETA 14). Cluj-Napoca, Romania 13-15 May 2004

A hybrid biometric-enhanced authentication system for Electronic and Mobile Commerce
Bencheikh, R. and Vasiu, L. 2004. A hybrid biometric-enhanced authentication system for Electronic and Mobile Commerce. 2004 IEEE-TTTC International Conference on Automation, Quality & Testing, Robotics, AQTR 2004 (THETA 14). Cluj-Napoca, Romania 13-15 May 2004

HomeNet: a grid type system for home networking
Vasiu, L. and Murphy, A. 2003. HomeNet: a grid type system for home networking. in: Gonzalez, T. (ed.) Proceedings of the 15th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), November 3 - 5, 2003. Marina del Rey, USA Acta Press.

Security Web services based on trust
Vasiu, L. 2003. Security Web services based on trust. 5th International Conference on Enterprise Information Systems (ICEIS'03). Angers, France 22-26 Apr 2003

An overview of security issues in wireless networks
Vasiu, L. and Papamichail, N. 2002. An overview of security issues in wireless networks. 6th World Multiconference on Systemics, Cybernetics and Informatics. Orlando, USA 14-18 Jul 2002

Security threads in mobile code
Vasiu, L. and Murphy, A. 2002. Security threads in mobile code. ICSE 2002: International Conference on Software Engineering. Orlando, Florida, USA 19-25 May 2002

Design requirements for mobile agent systems
Vasiu, L. and Murphy, A. 2002. Design requirements for mobile agent systems. 4th International Conference on Enterprise Information Systems (ICEIS'02). La Mancha Ciudad Real, Spain 03-06 Apr 2002

Analysis of wireless Java security
Vasiu, L. and Mahmoud, Q.H. 2002. Analysis of wireless Java security. 6th World Multiconference on Systemics, Cybernetics and Informatics. Orlando, USA 14-18 Jul 2002

Wireless security: the key to success for M-commerce
Vasiu, L. 2002. Wireless security: the key to success for M-commerce. Cutter IT Journal. 15 (10).

Security concerns in mobile code computation
Vasiu, L., Plaice, J., Kropf, P., Schulthess, P. and Slonim, J. 2002. Security concerns in mobile code computation. 4th International Conference on Distributed Communities on the Web (DCW 2002). Sydney, Australia 03-05 Apr 2002 Springer.

Mobile code protection
Vasiu, L. 2002. Mobile code protection. in: Baeza-Yates, R., Montanari, U. and Santoro, N. (ed.) Foundations of Information Technology in the Era of Network and Mobile Computing: IFIP 17th World Computing Congress: TC1 stream/2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), August 25-30, 2002 London, UK Kluwer Academic Publishers.

Accessing and using internet services from Java-enabled handheld wireless devices
Mahmoud, Q.H. and Vasiu, L. 2002. Accessing and using internet services from Java-enabled handheld wireless devices. 4th International Conference on Enterprise Information Systems (ICEIS'02). La Mancha Ciudad Real, Spain 03-06 Apr 2002

Security threads in Jini technology
Vasiu, L. 2001. Security threads in Jini technology. 6th INFORMS Conference on Information Systems & Technology (CIST 2001). Miami Beach, Florida 03-04 Nov 2001

Security concerns in Jini technology
Vasiu, L. 2001. Security concerns in Jini technology. ACM Conference on Object-Oriented Programming, Systems, Languages and Applications (OOPSLA'01). Tampa Bay, Florida 14-18 Oct 2001

Jini technology in e-commerce
Vasiu, L. 2001. Jini technology in e-commerce. 3rd International Conference on Enterprise Information Systems. Setubal, Portugal 07-10 Jul 2001

Permalink - https://westminsterresearch.westminster.ac.uk/item/92v13/hybrid-authentication-systems-towards-robust-user-authentication-on-wireless-and-mobile-devices-using-biometric-technologies


Share this

Usage statistics

127 total views
0 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.