Conceivable security risks and authentication techniques for smart devices

2.50
Hdl Handle:
http://hdl.handle.net/10547/622071
Title:
Conceivable security risks and authentication techniques for smart devices
Authors:
Muzammal, Syeda Mariam; Shah, Munam Ali ( 0000-0002-4037-3405 ) ; Zhang, Sijing; Yang, Hongji
Abstract:
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
Affiliation:
COMSATS Institute of Information Technology, Pakistan; University of Bedfordshire; Bath Spa University
Citation:
Muzammal SM, Shah MA, Zhang S, Yang H (2016) 'Conceivable security risks and authentication techniques for smart devices', International Journal of Automation and Computing, 13 (4), pp.350-363.
Publisher:
Springer
Journal:
International Journal of Automation and Computing
Issue Date:
29-Jun-2016
URI:
http://hdl.handle.net/10547/622071
DOI:
10.1007/s11633-016-1011-5
Additional Links:
http://link.springer.com/article/10.1007/s11633-016-1011-5
Type:
Article
Language:
en
ISSN:
1476-8186
Appears in Collections:
Computing

Full metadata record

DC FieldValue Language
dc.contributor.authorMuzammal, Syeda Mariamen
dc.contributor.authorShah, Munam Alien
dc.contributor.authorZhang, Sijingen
dc.contributor.authorYang, Hongjien
dc.date.accessioned2017-03-24T14:18:21Z-
dc.date.available2017-03-24T14:18:21Z-
dc.date.issued2016-06-29-
dc.identifier.citationMuzammal SM, Shah MA, Zhang S, Yang H (2016) 'Conceivable security risks and authentication techniques for smart devices', International Journal of Automation and Computing, 13 (4), pp.350-363.en
dc.identifier.issn1476-8186-
dc.identifier.doi10.1007/s11633-016-1011-5-
dc.identifier.urihttp://hdl.handle.net/10547/622071-
dc.description.abstractWith the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.en
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://link.springer.com/article/10.1007/s11633-016-1011-5en
dc.rightsGreen - can archive pre-print and post-print or publisher's version/PDF-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectsmart devicesen
dc.subjectsecurityen
dc.subjectsecurity risksen
dc.subjectauthenticationen
dc.subjectbiometricsen
dc.subjectprivacyen
dc.titleConceivable security risks and authentication techniques for smart devicesen
dc.typeArticleen
dc.contributor.departmentCOMSATS Institute of Information Technology, Pakistanen
dc.contributor.departmentUniversity of Bedfordshireen
dc.contributor.departmentBath Spa Universityen
dc.identifier.journalInternational Journal of Automation and Computingen
dc.date.updated2017-03-24T14:13:46Z-
This item is licensed under a Creative Commons License
Creative Commons
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.