Recent advances in mobile touch screen security authentication methods: a systematic literature review
The security of the smartphone touch screen has attracted considerable attention from academics as well as industry and security experts. The maximum security of the mobile phone touch screen is necessary to protect the user’s stored information in the event of loss. Previous reviews in this rese...
Main Authors: | , , , , , , , , , |
---|---|
Format: | Article |
Language: | English English English |
Published: |
Elsevier
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/71799/ http://irep.iium.edu.my/71799/ http://irep.iium.edu.my/71799/ http://irep.iium.edu.my/71799/13/71799_Recent%20advances%20in%20mobile%20touch%20screen_article.pdf http://irep.iium.edu.my/71799/7/71799_Recent%20advances%20in%20mobile_scopus.pdf http://irep.iium.edu.my/71799/14/71799_Recent%20advances%20in%20mobile%20touch%20screen_wos.pdf |
Summary: | The security of the smartphone touch screen has attracted considerable attention from
academics as well as industry and security experts. The maximum security of the mobile phone touch
screen is necessary to protect the user’s stored information in the event of loss. Previous reviews in this
research domain have focused primarily on biometrics and graphical passwords while leaving out PIN,
gesture/pattern and others. In this paper, we present a comprehensive literature review of the recent
advances made in mobile touch screen authentication techniques covering PIN, pattern/gesture,
biometrics, graphical password and others. A new comprehensive taxonomy of the various multiple class
authentication techniques is presented in order to expand the existing taxonomies on single class
authentication techniques. The review reveals that the most recent studies that propose new techniques
for providing maximum security to smartphone touch screen reveal multi-objective optimization
problems. In addition, open research problems and promising future research directions are presented in
the paper. Expert researchers can benefit from the review by gaining new insights into touch screen cyber
security, and novice researchers may use this paper as a starting point of their inquiry |
---|