ABSTRACT
The use of mobile devices worldwide has been on the increase. More and more people are using mobile devices to carry out activities on the Internet. The activities include checking emails, online banking, school, and work activities. However, mobile devices are susceptible to security risks and attacks. In this study, a survey was administered to 74 participants. The participants were asked whether they have multi-factor authentication on their mobile devices and if this feature is configured. Participants were also asked about how they use their mobile devices, how often they change their passwords, as well as their perception about the importance of mobile device security. The data collected from the participants was analyzed and results indicated that many participants strongly believe that mobile device security is important. Most of the participants use their mobile devices to check emails, conduct work activities, and online banking among other tasks. The results also indicate that nearly half of those who have devices that support multi-factor authentication do not use it. Furthermore, the results also show that nearly half of the participants have never changed the passwords on their mobile devices. The results may help organizations to educate people and raise the awareness of mobile device security. The results may also help with policy making.
- Shukla, S. (2017). Editorial: Security of Mobile Devices. ACM Transactions on Embedded Computing Systems, 16(4), 1–2. https://doi.org/10.1145/3129534.Google ScholarDigital Library
- An, Y. (2012). Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards. Journal of Biomedicine & Biotechnology, 2012, 519723–519726. https://doi.org/10.1155/2012/519723.Google Scholar
- Boonkrong, S. (2019). Security Analysis and Improvement of a Multi-Factor Biometric-Based Remote Authentication Scheme. IAENG International Journal of Computer Science, 46(4).Google Scholar
- Mujeye, S, Levy, Y, Mattord, H, Li, W. (2016) Empirical Results of Password Strength and Cognitive Load. Online Journal of Applied Knowledge Management.Google Scholar
- Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L. (2014). Robust Multi-Factor Authentication for Fragile Communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568-581, doi: 10.1109/TDSC.2013.2297110.Google Scholar
- Pankhuri, Sinha, A., Shrivastava, G., & Kumar, P. (2019). A Pattern-Based Multi-Factor Authentication System. Scalable Computing. Practice and Experience, 20(1), 101–112. https://doi.org/10.12694/scpe.v20i1.1460.Google Scholar
- Giwah, W., Wang, L., Levy, Y., & Hur, I. (2019). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory. Journal of Intellectual Capital, ahead-of-print(ahead-of-print). https://doi.org/10.1108/JIC-03-2019-0063Huang, X. (2014). Robust Multi-Factor Authentication for Fragile Communications. IEEE Transactions on Dependable and Secure Computing, 11(6), 568–581. https://doi.org/10.1109/tdsc.2013.2297110.Google Scholar
- Chin, A. G., Little, P., & Jones, B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University. International Journal of Education & Development Using Information & Communication Technology, 16(1), 44–61.Google Scholar
- Ehatisham-ul-Haq, A. (2017). Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing. Sensors (Basel, Switzerland), 17(9), 2043–. https://doi.org/10.3390/s17092043.Google Scholar
- Zaidi, S. F., Shah, M. A., Kamran, M., Javaid, Q., & Zhang, S. (2016). A Survey on Security for Smartphone Device. International Journal of Advanced Computer Science and Applications(IJACSA), 7(4), http://dx.doi.org/10.14569/IJACSA.2016.070426.Google Scholar
- Heisler, Y. (2016). Mobile internet usage surpasses desktop usage for the first time in history. Retrieved November 14, 2020, from https://bgr.com/2016/11/02/internet-usage-desktop-vsmobile/.Google Scholar
- Senft, D. (2013). Mobile devices: Technology aid—security risk. Geriatric Nursing (New York), 34(2), 149–150. https://doi.org/10.1016/j.gerinurse.2013.02.005.Google ScholarCross Ref
- Hintze, F. (2019). CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(3), 1–23. https://doi.org/10.1145/3351243.Google ScholarDigital Library
- Ranak, M. S. A. N., Azad, S., Nor, N. N. H. B. M., & Zamli, K. Z. (2017). Press touch code: A finger press based screen size independent authentication scheme for smart devices. PLoS ONE, 12(10), 1–20. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0186940.Google Scholar
- Grindrod, K., Khan, H., Hengartner, U., Ong, S., Logan, A. G., Vogel, D., Gebotys, R., & Yang, J. (2018). Evaluating authentication options for mobile health applications in younger and older adults. PLoS ONE, 13(1), 1–16. https://doi-org.libproxy.lib.ilstu.edu/10.1371/journal.pone.0189048.Google Scholar
- Taheri, Y. (2018). A Cross-Layer Biometric Recognition System for Mobile IoT Devices. Electronics (Basel), 7(2), 26–. https://doi.org/10.3390/electronics7020026.Google Scholar
- Bakshi, S., Sa, P. K., Wang, H., Barpanda, S. S., & Majhi, B. (2018). Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimedia Tools and Applications, 77(14), 17595-17623. doi:http://dx.doi.org.libproxy.lib.ilstu.edu/10.1007/s11042-017-4965-6.Google Scholar
- Gupta, E., Agrwal, M., & Sivakumar, R. (2020). Blink to Get In: Biometric Authentication for Mobile Devices using EEG Signals. ICC 2020 - 2020 IEEE International Conference on Communications (ICC), 1–6. https://doi.org/10.1109/ICC40277.2020.9148741.Google Scholar
- Garcia-Martin, R., & Sancez-Reillo, R. (2020). Vein Biometric Recognition on a Smartphone. IEEE Access, 8, 104801–104813. https://doi.org/10.1109/ACCESS.2020.3000044.Google ScholarCross Ref
- Braeken, A., Kumar, P., Liyanage, M., & Hue, T. T. K. (2018). An efficient anonymous authentication protocol in multiple server communication networks (EAAM). Journal of Supercomputing, 74(4), 1695–1714. https://doi-org.libproxy.lib.ilstu.edu/10.1007/s11227-017-2190-8.Google Scholar
- Dasgupta, D., Roy, A., & Nag A. (2017). Adaptive Multi-factor Authentication: Bring dynamicity in multi-factor authentication process. In Advances in User Authentication (pp. 281–355). Springer International Publishing. https://doi.org/10.1007/978-3-319-58808-7_7.Google ScholarCross Ref
- Knight, P. (2005). The Changing Demographics: The Diminishing Role of Age and Gender in Computer Usage. Journal of Organizational and End User Computing (JOEUC), 17(4), 49–65. https://doi.org/10.4018/joeuc.2005100103.Google ScholarCross Ref
Index Terms
- A Survey on Multi-Factor Authentication Methods for Mobile Devices
Recommendations
A survey on touch dynamics authentication in mobile devices
There have been research activities in the area of keystroke dynamics biometrics on physical keyboards (desktop computers or conventional mobile phones) undertaken in the past three decades. However, in terms of touch dynamics biometrics on virtual ...
Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
AbstractThe advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for ...
Next generation biometric security system: an approach for mobile device security
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyIn Information technology, biometrics refers to the technique that measure and analyse the human body characteristics either physiological and/or behavioural such as DNA, fingerprints, eye retina, iris, voice patterns, facial patterns and hand ...
Comments