Conceivable security risks and authentication techniques for smart devices
AffiliationCOMSATS Institute of Information Technology, Pakistan
University of Bedfordshire
Bath Spa University
MetadataShow full item record
AbstractWith the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.
CitationMuzammal SM, Shah MA, Zhang S, Yang H (2016) 'Conceivable security risks and authentication techniques for smart devices', International Journal of Automation and Computing, 13 (4), pp.350-363.
The following license files are associated with this item:
- Creative Commons
Except where otherwise noted, this item's license is described as Green - can archive pre-print and post-print or publisher's version/PDF