Statistics

    Map

Twitter

A Survey on Mobile Phone Authentication
( Vol-4,Issue-2,February 2017 )
Author(s):

T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena

Keywords:

Authentication, Brightness, Security, Smart Phone.

Abstract:

In modern days, gadgets are essential part of everyday lives and they enable to access a variety of ubiquitous services. Recently, the availability of these ubiquitous and mobile services has increased due to the different form of access provided by mobile devices, such as Bluetooth and Wi-Fi. In the same trend, the typologies of vulnerabilities exploiting these services and communication channels have boosted as well. Therefore, the presence of malware in mobile platform can seriously impact the end users privacy and security, reducing the end users trust in performing mobile access to its network services. In this, an authentication mechanism is based on screen brightness which prevents and increases security against side channel attacks.

ijaers doi crossref DOI:

10.22161/ijaers.4.2.7

Paper Statistics:
  • Total View : 344
  • Downloads : 31
  • Page No: 035-037
Cite this Article:
MLA
T. Sarala et al ."A Survey on Mobile Phone Authentication". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol 4, no. 2, 2017, pp.035-037 AI Publications, doi:10.22161/ijaers.4.2.7
APA
T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena(2017).A Survey on Mobile Phone Authentication. International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),4(2), 035-037. http://dx.doi.org/10.22161/ijaers.4.2.7
Chicago
T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena. 2017,"A Survey on Mobile Phone Authentication". International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).4(2):035-037. Doi: 10.22161/ijaers.4.2.7
Harvard
T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena. 2017,A Survey on Mobile Phone Authentication, International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)).4(2), pp:035-037
IEEE
T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena."A Survey on Mobile Phone Authentication", International Journal of Advanced Engineering Research and Science(ISSN : 2349-6495(P) | 2456-1908(O)),vol.4,no. 2, pp.035-037,2017.
Bibtex
@article {t.sarala2017a,
title={A Survey on Mobile Phone Authentication},
author={T. Sarala, G. Sathyapriya, D. Shalini, Dr S.Veena},
journal={International Journal of Advanced Engineering Research and Science},
volume={4},
year= {2017},
}
Share:
References:

[1] Daojing He, Sammy Chan, and Mohsen Guizani,”Mobile Application Security:Malware Threats and Defenses,”IEEE, 2015.
[2] Taejin Kim, Jeong Hyun Yi, and Changho Seo, “Spyware Resistant Smartphone User Authentication Scheme,” International Journal,2014.
[3] Kuan Zhang, XlaohulLlang, and XuemlnShen,”Exploiting Multimedia Services in Mobile Social Networks from Security and Privacy perspectivies,”IEEE Commun. Mag., March, 2014.
[4] P.D. Meshram, R.C. Thool,”A Survey paper on vulnerabilities in Android OS and Security of Android Devices,”Conference, 2014.
[5] Pradnya Mate, SnehalDhamale, and PranitaOhal, “Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones ,” IOSR Journal of Computer Engineering, 2013.
[6] AmeyaNayak, Tomas Prieto, Mohammad Alshamlan, andKang Yen, “Android Mobile Platform Security and Malware Survey,” International Journal, 2013.
[7] Yoshihiro Kita, Fumio Sugai, and MiRang Park, ”Proposal and its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift,” International Journal, 2013.
[8] MudassarRaza, Muhammad Iqbal, Muhammad Sharif, and WaqasHaider, “A Survey of Password Attacks and Comparative analysis on Methods for Secure Authentication,”in Journal, 2012.
[9] Taekyoung Kwon, Jin Hong,”Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks,” IEEE, 2012.
[10] Priyanka Goyal, SahilBatra, and AjitSingh,”A Literature Review of Security Attack in Mobile Ad-hoc Networks,”International Journal, Vol 9, No.12, November 2010.
[11] G.S. Mamatha, S.C. Sharma,”Network Layer Attacks and Defense Mechanisms in MANETS-A Survey,” International Journal, vol 9, No.9, November 2010.
[12] M. Gunther, D. Haufe, and R. Wurtz, “Shoulder Surfing attack in graphical password authentication,” International Journal ofComputer Science and Information Security, 2009