IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v73y2020i2d10.1007_s11235-019-00612-5.html
   My bibliography  Save this article

Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues

Author

Listed:
  • Mohamed Amine Ferrag

    (Guelma University)

  • Leandros Maglaras

    (De Montfort University
    General Secretariat of Digital Policy)

  • Abdelouahid Derhab

    (King Saud University)

  • Helge Janicke

    (De Montfort University)

Abstract

This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing survey articles published in the recent years that deal with security for mobile devices. Then, we give a classification of threat models in smart mobile devices in five categories, including, identity-based attacks, eavesdropping-based attacks, combined eavesdropping and identity-based attacks, manipulation-based attacks, and service-based attacks. This is followed by a description of multiple existing threat models. We also provide a classification of countermeasures into four types of categories, including, cryptographic functions, personal identification, classification algorithms, and channel characteristics. According to the characteristics of the countermeasure along with the authentication model iteself, we categorize the authentication schemes for smart mobile devices in four categories, namely, (1) biometric-based authentication schemes, (2) channel-based authentication schemes, (3) factors-based authentication schemes, and (4) ID-based authentication schemes. In addition, we provide a taxonomy and comparison of authentication schemes for smart mobile devices in form of tables. Finally, we identify open challenges and future research directions.

Suggested Citation

  • Mohamed Amine Ferrag & Leandros Maglaras & Abdelouahid Derhab & Helge Janicke, 2020. "Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 73(2), pages 317-348, February.
  • Handle: RePEc:spr:telsys:v:73:y:2020:i:2:d:10.1007_s11235-019-00612-5
    DOI: 10.1007/s11235-019-00612-5
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-019-00612-5
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-019-00612-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Mohamed Amine Ferrag, 2017. "EPEC: an efficient privacy-preserving energy consumption scheme for smart grid communications," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 66(4), pages 671-688, December.
    2. Khan, Muhammad Khurram & Zhang, Jiashu & Wang, Xiaomin, 2008. "Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices," Chaos, Solitons & Fractals, Elsevier, vol. 35(3), pages 519-524.
    3. Leandros Maglaras & Mohamed Amine Ferrag & Abdelouahid Derhab & Mithun Mukherjee & Helge Janicke, 2019. "Cyber Security: From Regulations and Policies to Practice," Springer Proceedings in Business and Economics, in: Androniki Kavoura & Efstathios Kefallonitis & Apostolos Giovanis (ed.), Strategic Innovative Marketing and Tourism, pages 763-770, Springer.
    4. Christoph Schmidt, 2016. "Agile Software Development," Progress in IS, in: Agile Software Development Teams, chapter 0, pages 7-35, Springer.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Guma Ali & Mussa Ally Dida & Anael Elikana Sam, 2020. "Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures," Future Internet, MDPI, vol. 12(10), pages 1-27, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Gupta, Manjul & George, Joey F. & Xia, Weidong, 2019. "Relationships between IT department culture and agile software development practices: An empirical investigation," International Journal of Information Management, Elsevier, vol. 44(C), pages 13-24.
    2. Shivam Gupta & Vinayak A. Drave & Surajit Bag & Zongwei Luo, 2019. "Leveraging Smart Supply Chain and Information System Agility for Supply Chain Flexibility," Information Systems Frontiers, Springer, vol. 21(3), pages 547-564, June.
    3. Florin DUMITRIU & Gabriela MESNITA & Laura Diana RADU, 2019. "Challenges and Solutions of Applying Large-Scale Agile at Organization-al Level," Informatica Economica, Academy of Economic Studies - Bucharest, Romania, vol. 23(3), pages 61-71.
    4. Berea Cristi, 2018. "Negotiation Analysis. The Context," Ovidius University Annals, Economic Sciences Series, Ovidius University of Constantza, Faculty of Economic Sciences, vol. 0(1), pages 284-288, July.
    5. Feldmann Anna, 2021. "The 5 P’s to success in intrapreneurial programs," Zeitschrift für das gesamte Genossenschaftswesen, De Gruyter, vol. 71(1), pages 5-37, March.
    6. C. J. Torrecilla-Salinas & O. Troyer & M. J. Escalona & M. Mejías, 2019. "A Delphi-based expert judgment method applied to the validation of a mature Agile framework for Web development projects," Information Technology and Management, Springer, vol. 20(1), pages 9-40, March.
    7. Marinho, Marcelo & Amorim, Luís & Camara, Rafael & Oliveira, Brigitte Renata & Sobral, Marcos & Sampaio, Suzana, 2021. "Happier and further by going together: The importance of software team behaviour during the COVID-19 pandemic," Technology in Society, Elsevier, vol. 67(C).
    8. Paloma Lanza‐León & Lidia Sanchez‐Ruiz & David Cantarero‐Prieto, 2021. "Kanban system applications in healthcare services: A literature review," International Journal of Health Planning and Management, Wiley Blackwell, vol. 36(6), pages 2062-2078, November.
    9. Čelesnik Goran & Radujković Mladen & Vrečko Igor, 2018. "Resolving Companies in Crisis: Agile Crisis Project Management," Organizacija, Sciendo, vol. 51(4), pages 223-237, December.
    10. Appiah, Gloria & Bonsu, Samuel K. & Sarpong, David, 2021. "The unpowered customer: Co-creation as tactics of the weak," Journal of Business Research, Elsevier, vol. 133(C), pages 317-326.
    11. Damjan Vavpotič & Marko Robnik-Šikonja & Tomaž Hovelja, 2020. "Exploring the Relations Between Net Benefits of IT Projects and CIOs’ Perception of Quality of Software Development Disciplines," Business & Information Systems Engineering: The International Journal of WIRTSCHAFTSINFORMATIK, Springer;Gesellschaft für Informatik e.V. (GI), vol. 62(4), pages 347-360, August.
    12. Shikha Sharma & Sanjeev K. Sharma, 2020. "Probing the Links Between Team Resilience, Competitive Advantage, and Organizational Effectiveness: Evidence from Information Technology Industry," Business Perspectives and Research, , vol. 8(2), pages 289-307, July.
    13. Mohamed Amine Ferrag & Leandros Maglaras & Ahmed Ahmim & Makhlouf Derdour & Helge Janicke, 2020. "RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks," Future Internet, MDPI, vol. 12(3), pages 1-14, March.
    14. Robert Modransky & Silvia Jakabova & Michal Hanak & Albert Olah, 2020. "Lean and Agile Project Management and the Challenges for its Implementation in SMEs in Czech Republic," Technium Social Sciences Journal, Technium Science, vol. 9(1), pages 413-440, July.
    15. K. C. Bhosale & P. J. Pawar, 2019. "Material flow optimisation of production planning and scheduling problem in flexible manufacturing system by real coded genetic algorithm (RCGA)," Flexible Services and Manufacturing Journal, Springer, vol. 31(2), pages 381-423, June.
    16. Amin, Mohamed & Faragallah, Osama S. & Abd El-Latif, Ahmed A., 2009. "Chaos-based hash function (CBHF) for cryptographic applications," Chaos, Solitons & Fractals, Elsevier, vol. 42(2), pages 767-772.
    17. Aymeric Hemon & Barbara Lyonnet & Frantz Rowe & Brian Fitzgerald, 2020. "From Agile to DevOps: Smart Skills and Collaborations," Information Systems Frontiers, Springer, vol. 22(4), pages 927-945, August.
    18. Akhshani, A. & Behnia, S. & Akhavan, A. & Jafarizadeh, M.A. & Abu Hassan, H. & Hassan, Z., 2009. "Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2405-2412.
    19. Islam, Gibrail & Storer, Tim, 2020. "A case study of agile software development for safety-Critical systems projects," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    20. Evgeny Nikulchev & Dmitry Ilin & Alexander Gusev, 2021. "Technology Stack Selection Model for Software Design of Digital Platforms," Mathematics, MDPI, vol. 9(4), pages 1-12, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:73:y:2020:i:2:d:10.1007_s11235-019-00612-5. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.