Authentication securing methods for mobile identity: issues, solutions and challenges
Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most re...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Published: |
MDPI
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/100493/ |
| _version_ | 1848863337755967488 |
|---|---|
| author | Ahmad Zukarnain, Zuriati Muneer, Amgad Ab Aziz, Mohd Khairulanuar |
| author_facet | Ahmad Zukarnain, Zuriati Muneer, Amgad Ab Aziz, Mohd Khairulanuar |
| author_sort | Ahmad Zukarnain, Zuriati |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users’ authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users’ personal information and biometric features. There is also a combination of multiple user-based authentications, such as user’s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. |
| first_indexed | 2025-11-15T13:31:19Z |
| format | Article |
| id | upm-100493 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-15T13:31:19Z |
| publishDate | 2022 |
| publisher | MDPI |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-1004932023-11-23T08:53:57Z http://psasir.upm.edu.my/id/eprint/100493/ Authentication securing methods for mobile identity: issues, solutions and challenges Ahmad Zukarnain, Zuriati Muneer, Amgad Ab Aziz, Mohd Khairulanuar Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users’ authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users’ personal information and biometric features. There is also a combination of multiple user-based authentications, such as user’s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. MDPI 2022-04-14 Article PeerReviewed Ahmad Zukarnain, Zuriati and Muneer, Amgad and Ab Aziz, Mohd Khairulanuar (2022) Authentication securing methods for mobile identity: issues, solutions and challenges. Symmetry, 14 (4). art. no. 821. pp. 1-17. ISSN 2073-8994 https://www.mdpi.com/2073-8994/14/4/821 10.3390/sym14040821 |
| spellingShingle | Ahmad Zukarnain, Zuriati Muneer, Amgad Ab Aziz, Mohd Khairulanuar Authentication securing methods for mobile identity: issues, solutions and challenges |
| title | Authentication securing methods for mobile identity: issues, solutions and challenges |
| title_full | Authentication securing methods for mobile identity: issues, solutions and challenges |
| title_fullStr | Authentication securing methods for mobile identity: issues, solutions and challenges |
| title_full_unstemmed | Authentication securing methods for mobile identity: issues, solutions and challenges |
| title_short | Authentication securing methods for mobile identity: issues, solutions and challenges |
| title_sort | authentication securing methods for mobile identity: issues, solutions and challenges |
| url | http://psasir.upm.edu.my/id/eprint/100493/ http://psasir.upm.edu.my/id/eprint/100493/ http://psasir.upm.edu.my/id/eprint/100493/ |