Feedback

Conceivable security risks and authentication techniques for smart devices: a comparative evaluation of security practices

Muzammal, S.M, Shah, M.A, Zhang, S-J and Yang, H (2016) 'Conceivable security risks and authentication techniques for smart devices: a comparative evaluation of security practices.' International Journal of Automation and Computing, 13 (4). pp. 350-363. ISSN 1476-8186

Abstract

With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques.

Item Type: Article
Keywords: Smart devices; security risks; authentication; biometric; privacy
Divisions: College of Liberal Arts
Date Deposited: 05 Mar 2017 18:08
Last Modified: 05 Mar 2017 18:11
Request a change to this item or report an issue Request a change to this item or report an issue
Update item (repository staff only) Update item (repository staff only)