Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges

Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most re...

Full description

Saved in:
Bibliographic Details
Main Authors: Zukarnain, Z.A., Muneer, A., Ab Aziz, M.K.
Format: Article
Published: MDPI 2022
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129078098&doi=10.3390%2fsym14040821&partnerID=40&md5=b4714e1dcbf465611b32634e1cb46df0
http://eprints.utp.edu.my/33581/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utp.eprints.33581
record_format eprints
spelling my.utp.eprints.335812022-09-07T08:27:11Z Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges Zukarnain, Z.A. Muneer, A. Ab Aziz, M.K. Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users� authentication methods used are passwords and short messages. How-ever, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users� personal information and biometric features. There is also a combination of multiple user-based authentications, such as user�s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. © 2022 by the authors. Licensee MDPI, Basel, Switzerland. MDPI 2022 Article NonPeerReviewed https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129078098&doi=10.3390%2fsym14040821&partnerID=40&md5=b4714e1dcbf465611b32634e1cb46df0 Zukarnain, Z.A. and Muneer, A. and Ab Aziz, M.K. (2022) Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges. Symmetry, 14 (4). http://eprints.utp.edu.my/33581/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
description Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users� authentication methods used are passwords and short messages. How-ever, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users� personal information and biometric features. There is also a combination of multiple user-based authentications, such as user�s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. © 2022 by the authors. Licensee MDPI, Basel, Switzerland.
format Article
author Zukarnain, Z.A.
Muneer, A.
Ab Aziz, M.K.
spellingShingle Zukarnain, Z.A.
Muneer, A.
Ab Aziz, M.K.
Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
author_facet Zukarnain, Z.A.
Muneer, A.
Ab Aziz, M.K.
author_sort Zukarnain, Z.A.
title Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
title_short Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
title_full Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
title_fullStr Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
title_full_unstemmed Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges
title_sort authentication securing methods for mobile identity: issues, solutions and challenges
publisher MDPI
publishDate 2022
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129078098&doi=10.3390%2fsym14040821&partnerID=40&md5=b4714e1dcbf465611b32634e1cb46df0
http://eprints.utp.edu.my/33581/
_version_ 1744356188241264640
score 13.211869