Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices
نویسندگان
چکیده
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorised use of the handset is a four digit Personal Identification Number (PIN). This paper presents the findings of a survey into the opinions of subscribers regarding the need for security in mobile devices, their use of current methods, and their attitudes towards alternative approaches that could be employed in the future. It is concluded that, although the need for security is understood and appreciated, the current PIN-based approach is under-utilised and can, therefore, be considered to provide inadequate protection in many cases. Surveyed users responded positively towards alternative methods of authentication, such as fingerprint scanning and voice verification. Based upon these findings, the paper concludes that a non-intrusive, and possibly hybrid, method of authentication (using a combination of techniques) would best satisfy the needs of future subscribers.
منابع مشابه
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets
The mobile communications industry will experience an evolutionary step within the next two years with the introduction of third generation mobile networks, completing the handset transition from a purely telephony device of the first generation analogue networks into a multimedia multi-purpose mobile communications tool. The ability of these new handsets to store and access sensitive informati...
متن کاملA Novel Approach for Authentication Technique in Mobile Communications
216 Abstract—Authentication of mobile subscriber is a challenge of future researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3G mobile communication system has been developed to speed up the data communication. In general the authentication technique in 2G mobile communication is solely dependent on checking the authenticity of MS (Mobil...
متن کاملNon-Intrusive Subscriber Authentication for 3G Mobile Systems
Mobile phones are now an accepted part of everyday life, with users becoming more reliant on the services that they can provide. In the vast majority of systems, the only security to prevent unauthorised use of the handset is a Personal Identification Number (PIN). Although this may be argued to be commensurate with the requirements of current mobile applications, it is considered that the exte...
متن کاملVirtualisation of a SIM-Card using trusted computing
The goal of this thesis is to examine, how subscriber authentication in mobile cellular networks could be implemented to the next generation of mobile phones and devices. In this context, we consider and evaluate several architectural directions and propose a novel solution of a software replacement for the Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture. Therefor,...
متن کاملRetrofitting Mutual Authentication to GSM Using RAND Hijacking
As has been widely discussed, the GSM mobile telephony system only offers unilateral authentication of the mobile phone to the network; this limitation permits a range of attacks. While adding support for mutual authentication would be highly beneficial, changing the way GSM serving networks operate is not practical. This paper proposes a novel modification to the relationship between a Subscri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 21 شماره
صفحات -
تاریخ انتشار 2002