skip to main content
10.1145/3451471.3451503acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsimConference Proceedingsconference-collections
research-article

A Survey on Multi-Factor Authentication Methods for Mobile Devices

Published:13 July 2021Publication History

ABSTRACT

The use of mobile devices worldwide has been on the increase. More and more people are using mobile devices to carry out activities on the Internet. The activities include checking emails, online banking, school, and work activities. However, mobile devices are susceptible to security risks and attacks. In this study, a survey was administered to 74 participants. The participants were asked whether they have multi-factor authentication on their mobile devices and if this feature is configured. Participants were also asked about how they use their mobile devices, how often they change their passwords, as well as their perception about the importance of mobile device security. The data collected from the participants was analyzed and results indicated that many participants strongly believe that mobile device security is important. Most of the participants use their mobile devices to check emails, conduct work activities, and online banking among other tasks. The results also indicate that nearly half of those who have devices that support multi-factor authentication do not use it. Furthermore, the results also show that nearly half of the participants have never changed the passwords on their mobile devices. The results may help organizations to educate people and raise the awareness of mobile device security. The results may also help with policy making.

References

  1. Shukla, S. (2017). Editorial: Security of Mobile Devices. ACM Transactions on Embedded Computing Systems, 16(4), 1–2. https://doi.org/10.1145/3129534.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. An, Y. (2012). Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards. Journal of Biomedicine & Biotechnology, 2012, 519723–519726. https://doi.org/10.1155/2012/519723.Google ScholarGoogle Scholar
  3. Boonkrong, S. (2019). Security Analysis and Improvement of a Multi-Factor Biometric-Based Remote Authentication Scheme. IAENG International Journal of Computer Science, 46(4).Google ScholarGoogle Scholar
  4. Mujeye, S, Levy, Y, Mattord, H, Li, W. (2016) Empirical Results of Password Strength and Cognitive Load. Online Journal of Applied Knowledge Management.Google ScholarGoogle Scholar
  5. Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L. (2014). Robust Multi-Factor Authentication for Fragile Communications.  IEEE Transactions on Dependable and Secure Computing, 11(6), 568-581, doi: 10.1109/TDSC.2013.2297110.Google ScholarGoogle Scholar
  6. Pankhuri, Sinha, A., Shrivastava, G., & Kumar, P. (2019). A Pattern-Based Multi-Factor Authentication System. Scalable Computing. Practice and Experience, 20(1), 101–112. https://doi.org/10.12694/scpe.v20i1.1460.Google ScholarGoogle Scholar
  7. Giwah, W., Wang, L., Levy, Y., & Hur, I. (2019). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory. Journal of Intellectual Capital, ahead-of-print(ahead-of-print). https://doi.org/10.1108/JIC-03-2019-0063Huang, X. (2014). Robust Multi-Factor Authentication for Fragile Communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568–581. https://doi.org/10.1109/tdsc.2013.2297110.Google ScholarGoogle Scholar
  8. Chin, A. G., Little, P., & Jones, B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University. International Journal of Education & Development Using Information & Communication Technology, 16(1), 44–61.Google ScholarGoogle Scholar
  9. Ehatisham-ul-Haq, A. (2017). Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors (Basel, Switzerland), 17(9), 2043–. https://doi.org/10.3390/s17092043.Google ScholarGoogle Scholar
  10. Zaidi, S. F., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A Survey on Security for Smartphone Device. International Journal of Advanced Computer Science and Applications(IJACSA), 7(4), http://dx.doi.org/10.14569/IJACSA.2016.070426.Google ScholarGoogle Scholar
  11. Heisler, Y. (2016). Mobile internet usage surpasses desktop usage for the first time in history. Retrieved November 14, 2020, from https://bgr.com/2016/11/02/internet-usage-desktop-vsmobile/.Google ScholarGoogle Scholar
  12. Senft, D. (2013). Mobile devices: Technology aid—security risk. Geriatric Nursing (New York), 34(2), 149–150. https://doi.org/10.1016/j.gerinurse.2013.02.005.Google ScholarGoogle ScholarCross RefCross Ref
  13. Hintze, F. (2019). CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3), 1–23. https://doi.org/10.1145/3351243.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ranak, M. S. A. N., Azad, S., Nor, N. N. H. B. M., & Zamli, K. Z. (2017). Press touch code: A finger press based screen size independent authentication scheme for smart devices. PLoS ONE, 12(10), 1–20. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0186940.Google ScholarGoogle Scholar
  15. Grindrod, K., Khan, H., Hengartner, U., Ong, S., Logan, A. G., Vogel, D., Gebotys, R., & Yang, J. (2018). Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE, 13(1), 1–16. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0189048.Google ScholarGoogle Scholar
  16. Taheri, Y. (2018). A Cross-Layer Biometric Recognition System for Mobile IoT Devices. Electronics (Basel), 7(2), 26–. https://doi.org/10.3390/electronics7020026.Google ScholarGoogle Scholar
  17. Bakshi, S., Sa, P. K., Wang, H., Barpanda, S. S., & Majhi, B. (2018). Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimedia Tools and Applications, 77(14), 17595-17623. doi:http://dx.doi.org.libproxy.lib.ilstu.edu/10.1007/s11042-017-4965-6.Google ScholarGoogle Scholar
  18. Gupta, E., Agrwal, M., & Sivakumar, R. (2020). Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals. ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 1–6. https://doi.org/10.1109/ICC40277.2020.9148741.Google ScholarGoogle Scholar
  19. Garcia-Martin, R., & Sancez-Reillo, R. (2020). Vein Biometric Recognition on a Smartphone. IEEE Access, 8, 104801–104813. https://doi.org/10.1109/ACCESS.2020.3000044.Google ScholarGoogle ScholarCross RefCross Ref
  20. Braeken, A., Kumar, P., Liyanage, M., & Hue, T. T. K. (2018). An efficient anonymous authentication protocol in multiple server communication networks (EAAM). Journal of Supercomputing, 74(4), 1695–1714. https://doi-org.libproxy.lib.ilstu.edu/10.1007/s11227-017-2190-8.Google ScholarGoogle Scholar
  21. Dasgupta, D., Roy, A., & Nag A. (2017). Adaptive Multi-factor Authentication: Bring dynamicity in multi-factor authentication process. In Advances in User Authentication (pp. 281–355). Springer International Publishing. https://doi.org/10.1007/978-3-319-58808-7_7.Google ScholarGoogle ScholarCross RefCross Ref
  22. Knight, P. (2005). The Changing Demographics: The Diminishing Role of Age and Gender in Computer Usage. Journal of Organizational and End User Computing (JOEUC), 17(4), 49–65. https://doi.org/10.4018/joeuc.2005100103.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Survey on Multi-Factor Authentication Methods for Mobile Devices
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICSIM '21: Proceedings of the 2021 4th International Conference on Software Engineering and Information Management
          January 2021
          251 pages
          ISBN:9781450388955
          DOI:10.1145/3451471

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 July 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format