A Survey on Smartphone Authentication

The growing use of smartphones is actuating the need for better protection.Practically, smartphone users chiefs wine glass are often not adequately alert when it comes to protection of their credentials stored in the phones, even if they are very much concerned about security, reliability and privacy.To efficiently reduce smartphone vulnerability, an appropriate authentication which does not create more of a burden to users is required.

In consequence, the three novel authentication premises that are typically used to authenticate users: something you know, something you have, and something you are, are examined.The basics of smartphone architecture are introduced.The strengths and limitations of each technique are highlighted, while several comprehensive solutions have been presented to encourage smartphone users to understand the capabilities of their current systems.

A discussion on real-world experience of oakley fives 4.0 those techniques is also proffered as an open challenge to magnify the aftermath.doi:10.14456/WJST.

2015.1.

Leave a Reply

Your email address will not be published. Required fields are marked *