Authentication securing methods for mobile identity: issues, solutions and challenges

Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most re...

Full description

Bibliographic Details
Main Authors: Ahmad Zukarnain, Zuriati, Muneer, Amgad, Ab Aziz, Mohd Khairulanuar
Format: Article
Published: MDPI 2022
Online Access:http://psasir.upm.edu.my/id/eprint/100493/
_version_ 1848863337755967488
author Ahmad Zukarnain, Zuriati
Muneer, Amgad
Ab Aziz, Mohd Khairulanuar
author_facet Ahmad Zukarnain, Zuriati
Muneer, Amgad
Ab Aziz, Mohd Khairulanuar
author_sort Ahmad Zukarnain, Zuriati
building UPM Institutional Repository
collection Online Access
description Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users’ authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users’ personal information and biometric features. There is also a combination of multiple user-based authentications, such as user’s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges.
first_indexed 2025-11-15T13:31:19Z
format Article
id upm-100493
institution Universiti Putra Malaysia
institution_category Local University
last_indexed 2025-11-15T13:31:19Z
publishDate 2022
publisher MDPI
recordtype eprints
repository_type Digital Repository
spelling upm-1004932023-11-23T08:53:57Z http://psasir.upm.edu.my/id/eprint/100493/ Authentication securing methods for mobile identity: issues, solutions and challenges Ahmad Zukarnain, Zuriati Muneer, Amgad Ab Aziz, Mohd Khairulanuar Smartphone devices have become an essential part of our daily activities for performing various essential applications containing very confidential information. For this reason, the security of the device and the transactions is required to ensure that the transactions are performed legally. Most regular mobile users’ authentication methods used are passwords and short messages. However, numerous security vulnerabilities are inherent in various authentication schemes. Fingerprint identification and face recognition technology sparked a massive wave of adoption a few years back. The international mobile equipment identity (IMEI) and identity-based public key cryptography (ID-based PKC) have also become widely used options. More complex methods have been introduced, such as the management flow that combines transaction key creation, encryption, and decryption in processing users’ personal information and biometric features. There is also a combination of multiple user-based authentications, such as user’s trip routes initialization with the coordinates of home and office to set template trajectories and stay points for authentication. Therefore, this research aimed to identify the issues with the available authentication methods and the best authentication solution while overcoming the challenges. MDPI 2022-04-14 Article PeerReviewed Ahmad Zukarnain, Zuriati and Muneer, Amgad and Ab Aziz, Mohd Khairulanuar (2022) Authentication securing methods for mobile identity: issues, solutions and challenges. Symmetry, 14 (4). art. no. 821. pp. 1-17. ISSN 2073-8994 https://www.mdpi.com/2073-8994/14/4/821 10.3390/sym14040821
spellingShingle Ahmad Zukarnain, Zuriati
Muneer, Amgad
Ab Aziz, Mohd Khairulanuar
Authentication securing methods for mobile identity: issues, solutions and challenges
title Authentication securing methods for mobile identity: issues, solutions and challenges
title_full Authentication securing methods for mobile identity: issues, solutions and challenges
title_fullStr Authentication securing methods for mobile identity: issues, solutions and challenges
title_full_unstemmed Authentication securing methods for mobile identity: issues, solutions and challenges
title_short Authentication securing methods for mobile identity: issues, solutions and challenges
title_sort authentication securing methods for mobile identity: issues, solutions and challenges
url http://psasir.upm.edu.my/id/eprint/100493/
http://psasir.upm.edu.my/id/eprint/100493/
http://psasir.upm.edu.my/id/eprint/100493/