Is a method for uniquely recognizing an individual using measurable patterns in human activities or actions.
Published in Chapter:
Biometric Authentication Schemes and Methods on Mobile Devices: A Systematic Review
Akon Obu Ekpezu (Cross River University of Technology, Cross River, Nigeria), Enoima Essien Umoh (Cross River University of Technology, Nigeria), Felix Nti Koranteng (University of Education, Winneba, Kumasi Campus, Ghana), and Joseph Ahor Abandoh-Sam (Valley View University, Ghana)
Copyright: © 2020
|Pages: 21
DOI: 10.4018/978-1-7998-3149-5.ch011
Abstract
Due to the sensitivity and amount of information stored on mobile devices, the need to protect these devices from unauthorized access has become imperative. Among the various mechanisms to manage access on mobile devices, this chapter focused on identifying research trends on biometric authentication schemes. The systematic literature review approach was adopted to guide future researches in the subject area. Consequently, seventeen selected articles from journals in three databases (IEEE, ACM digital library, and SpringerLink) were reviewed. Findings from the reviewed articles indicated that touch gestures are the predominant authentication technique used in mobile devices, particularly in android devices. Furthermore, mimic attacks were identified as the commonest attacks on biometric authentic schemes. While, robust authentication techniques such as dental occlusion, ECG (electrocardiogram), palmprints and knuckles were identified as newly implemented authentication techniques in mobile devices.