1,612 research outputs found

    Mobile security and smart systems

    Get PDF

    Continuous and transparent multimodal authentication: reviewing the state of the art

    Get PDF
    Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. They are also still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. Thus, it is apparent that a more innovative, convenient and secure user authentication solution is vital. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art and identifying the open problems to be tackled and available solutions to be adopted. It also investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. This is followed by a literature review of the existing research on continuous and transparent multimodal authentication. It concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level. Ultimately, a potential federated biometric authentication solution is presented; however it needs to be developed and extensively evaluated, thus operating in a transparent, continuous and user-friendly manner

    A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants

    Get PDF
    Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners accessing the applicatio

    A Phone Learning Model for Enhancing Productivity of Visually Impaired Civil Servants

    Get PDF
    Phone-based learning in civil service is the use of voice technologies to deliver learning and capacity building training services to government employees. The Internet revolution and advancement in Information and Communications Technology (ICT) have given rise to online and remote staff training for the purpose of enhancing workers productivity. The need for civil servants in Nigeria to develop capacity that will enhance knowledge is a key requirement to having competitive advantage in the work place. Existing online learning platforms (such as web-based learning, mobile learning, etc) did not consider the plight of the visually impaired. These platforms provide graphical interfaces that require sight to access. The visually impaired civil servants require auditory access to functionalities that exist in learning management system on the Internet. Thus a gap exist between the able-bodied and visually impaired civil servants on accessibility to e-learning platform. The objective of this paper is to provide a personalized telephone learning model and a prototype application that will enhance the productivity of the visually impaired workers in Government establishments in Nigeria. The model was designed using Unified Modeling Language (UML) diagram. The prototype application was implemented and evaluated. With the proposed model and application, the visually and mobility impaired worker are able to participate in routine staff training and consequently enhances their productivity just like their able-bodied counterparts. The prototype application also serves as an alternative training platform for the able-bodied workers. Future research direction for this study will include biometric authentication of learners accessing the applicatio

    Mobile Authentication with NFC enabled Smartphones

    Get PDF
    Smartphones are becoming increasingly more deployed and as such new possibilities for utilizing the smartphones many capabilities for public and private use are arising. This project will investigate the possibility of using smartphones as a platform for authentication and access control, using near field communication (NFC). To achieve the necessary security for authentication and access control purposes, cryptographic concepts such as public keys, challenge-response and digital signatures are used. To focus the investigation a case study is performed based on the authentication and access control needs of an educational institutions student ID. To gain a more practical understanding of the challenges mobile authentication encounters, a prototype has successfully been developed on the basis of the investigation. The case study performed in this project argues that NFC as a standalone technology is not yet mature to support the advanced communication required by this case. However, combining NFC with other communication technologies such as Bluetooth has proven to be effective. As a result, a general evaluation has been performed on several aspects of the prototype, such as cost-effectiveness, usability, performance and security to evaluate the viability of mobile authentication

    A survey on touch dynamics authentication in mobile devices

    Get PDF
    © 2016 Elsevier Ltd. All rights reserved. There have been research activities in the area of keystroke dynamics biometrics on physical keyboards (desktop computers or conventional mobile phones) undertaken in the past three decades. However, in terms of touch dynamics biometrics on virtual keyboards (modern touchscreen mobile devices), there has been little published work. Particularly, there is a lack of an extensive survey and evaluation of the methodologies adopted in the area. Owing to the widespread use of touchscreen mobile devices, it is necessary for us to examine the techniques and their effectiveness in the domain of touch dynamics biometrics. The aim of this paper is to provide some insights and comparative analysis of the current state of the art in the topic area, including data acquisition protocols, feature data representations, decision making techniques, as well as experimental settings and evaluations. With such a survey, we can gain a better understanding of the current state of the art, thus identifying challenging issues and knowledge gaps for further research

    Perceptions of Risk and Security Concerns with Mobile Devices using Biometric vs Traditional Authentication Methods

    Get PDF
    Authentication methods on mobile devices provide an important layer of security. Many types of authentication methods exist, some traditional and some biometric-based. In this study, we use a survey method to examine whether the presence and type of an authentication method affect perceptions of risk and security concerns around three specific types of mobile device actions: banking, health, and activities with personally identifiable information (PII). We also survey users’ general perceptions of trust, usefulness, convenience, and ease of use toward authentication methods, both traditional and biometric. We find that users’ perceptions of risk and security concerns change when users consider the type of authentication method present on a device. While traditional methods are still more familiar to most users, we also find that perceptions of biometric-based methods are more similar to perceptions of traditional methods than in the past
    • …
    corecore