4.5 Review

Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges

Related references

Note: Only part of the references are listed.
Review Chemistry, Analytical

Revolution or Evolution? Technical Requirements and Considerations towards 6G Mobile Communications

Saddam Alraih et al.

Summary: This article discusses the development of mobile communication technology, progressing from 5G to the upcoming 6G. 6G is expected to bring revolutionary improvements, including high data rates, artificial intelligence, and low energy consumption. The article introduces the vision, requirements, and key technologies of 6G, and compares it to 5G.

SENSORS (2022)

Article Computer Science, Information Systems

A distributed adaptive optimization spiking neural P system for approximately solving combinatorial optimization problems

Jianping Dong et al.

Summary: This paper proposes a distributed adaptive optimization spiking neural P system (DAOSNPS) that can solve combinatorial optimization problems without the help of evolutionary algorithms or swarm intelligence algorithms. Extensive experiments demonstrate its superiority over other methods.

INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Global optimization on non-convex two-way interaction truncated linear multivariate adaptive regression splines using mixed integer quadratic programming

Xinglong Ju et al.

Summary: This paper presents an efficient and effective approach to find the global optimal value of MARS models that incorporate two-way interaction terms. Experimental results demonstrate that the proposed method can successfully and efficiently find the global optimal solution.

INFORMATION SCIENCES (2022)

Article Computer Science, Hardware & Architecture

Identity authentication based on trajectory characteristics of mobile devices

Zhigang Gao et al.

Summary: The paper proposes a Trajectory-based Identity Authentication Method (TIAM) which calculates trajectory similarity to authenticate users and dynamically adapts to changes in user trip routes. Experimental results show that TIAM has a high average authentication accuracy.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Engineering, Multidisciplinary

Implicit authentication method for smartphone users based on rank aggregation and random forest

Mohamed W. Abo El-Soud et al.

Summary: Smartphone users currently authenticate using mechanisms like passwords or security patterns, which are vulnerable to attacks. This study proposes an implicit authentication method based on user behavior (such as touch behavior) with feature selection to enhance performance, achieving high accuracy and low error rates in experiments.

ALEXANDRIA ENGINEERING JOURNAL (2021)

Article Computer Science, Information Systems

eID and Self-Sovereign Identity Usage: An Overview

Daniela Poehn et al.

Summary: The COVID-19 pandemic has facilitated the use of mobile eID solutions, and the concept of self-sovereign identity can enhance privacy protection for citizens while also facing challenges that need to be overcome.

ELECTRONICS (2021)

Article Green & Sustainable Science & Technology

Impact of Perceived Risk on Consumers Technology Acceptance in Online Grocery Adoption amid COVID-19 Pandemic

Sufyan Habib et al.

Summary: The spread of the COVID-19 pandemic has significantly influenced the online shopping behavior of Indian customers, which is also affected by the UTAUT2 model, particularly in terms of perceived risk and consumer trust. To promote e-commerce in India, marketers should focus on building consumer trust and reducing perceived risks associated with online shopping.

SUSTAINABILITY (2021)

Article Computer Science, Information Systems

A Survey of Physical-Layer Authentication in Wireless Communications

Ning Xie et al.

Summary: This article provides a detailed survey of features and techniques that can be used in Physical-Layer Authentication (PLA), categorizing existing PLA schemes into passive and active categories. Different verification methods in passive and active schemes are discussed, along with future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Theory & Methods

Intelligent mobile malware detection using permission requests and API calls

Moutaz Alazab et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Review Engineering, Electrical & Electronic

Physical unclonable functions

Yansong Gao et al.

NATURE ELECTRONICS (2020)

Article Telecommunications

A survey on authentication and access control for mobile networks: from 4G to 5G

Shanay Behrad et al.

ANNALS OF TELECOMMUNICATIONS (2019)

Review Computer Science, Hardware & Architecture

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

Mohamed Amine Ferrag et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Construction & Building Technology

Provably secure pseudo-identity based device authentication for smart cities environment

Alavalapati Goutham Reddy et al.

SUSTAINABLE CITIES AND SOCIETY (2018)

Article Computer Science, Hardware & Architecture

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

Debiao He et al.

COMPUTER NETWORKS (2017)

Article Computer Science, Information Systems

A privacy-enhanced computationally-efficient and comprehensive LTE-AKA

Khodor Hamandi et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

A Survey of Wearable Biometric Recognition Systems

Jorge Blasco et al.

ACM COMPUTING SURVEYS (2016)

Article Engineering, Electrical & Electronic

LTE/LTE-A Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation

Marc Lichtman et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Electrical & Electronic

Physical-layer authentication for wireless security enhancement: current challenges and future developments

Xianbin Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Electrical & Electronic

A survey on 5G: The next generation of mobile communication

Nisha Panwar et al.

PHYSICAL COMMUNICATION (2016)

Article Health Care Sciences & Services

Human Identification Using Compressed ECG Signals

Carmen Camara et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

A Survey on Security Aspects for LTE and LTE-A Networks

Jin Cao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Multidisciplinary Sciences

Privacy-Enhancing Security Protocol in LTE Initial Attack

Uijin Jang et al.

SYMMETRY-BASEL (2014)

Article Computer Science, Information Systems

LTE/SAE Security Issues on 4G Wireless Networks

Anastasios N. Bikos et al.

IEEE SECURITY & PRIVACY (2013)

Article Computer Science, Information Systems

A survey on biometric cryptosystems and cancelable biometrics

Christian Rathgeb et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2011)

Article Computer Science, Theory & Methods

Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics

Chun-I Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Theory & Methods

New Approaches for Deniable Authentication

Mario Di Raimondo et al.

JOURNAL OF CRYPTOLOGY (2009)

Article Computer Science, Information Systems

A novel deniable authentication protocol using generalized ElGamal signature scheme

Wei-Bin Lee et al.

INFORMATION SCIENCES (2007)

Article Computer Science, Information Systems

An identity management protocol for Internet applications over 3G mobile networks

CK Dimitriadis et al.

COMPUTERS & SECURITY (2006)

Article Computer Science, Hardware & Architecture

Efficient deniable authentication protocol based on generalized ElGamal signature scheme

ZH Shao

COMPUTER STANDARDS & INTERFACES (2004)

Article Engineering, Electrical & Electronic

Fingerprint-based remote user authentication scheme using smart cards

JK Lee et al.

ELECTRONICS LETTERS (2002)

Article Computer Science, Hardware & Architecture

Risks of the Passport single signon protocol

DP Kormann et al.

COMPUTER NETWORKS (2000)